A vector illustration of a robber breaking into a computer but security is stopping him.

The Growing Importance of Security Assurance (And What It Means to Be Good at Compliance Operations)

Living through a global pandemic has made life tough for every human on the planet—some far more than ... Read More The post The Growing Importance of Security Assurance (And What It ...
Safeguard your data before it gets corrupted and lost

28th January: Save the Date. Save the Data!

| | Data Privacy
On 26th January 2006, the Council of Europe decided to launch a Data Protection Day on 28th January that isContinue reading The post 28th January: Save the Date. Save the Data! appeared ...
A vector character symbolically places something into a protected space, illustrating security data controls

Critical Data Security Controls Every Organization Needs

Regardless of the type of business you operate, odds are you have, or will have, some form of ... Read More The post Critical Data Security Controls Every Organization Needs appeared first ...

Privacy in 2020 and What to Expect for the Year Ahead

2020 was dominated by news of the pandemic and anchored by reality that we all found ourselves in – entire families logging in remotely, trying to keep school and work feeling “normal.” While ...

Could Universities’ Use of Surveillance Software Be Putting Students at Risk?

Life for university students has changed massively during the coronavirus pandemic, as it has for all of us. While some in-person lectures and seminars are still taking place, there has been a ...

A Company Culture of Data Privacy – Your Role as a Data Caretaker

The big cloud service providers—think Amazon Web Services, Microsoft, and Google—are very clear about the shared responsibility model. If you distill out of it all the nuances and variables, this model comes ...
Vector workers plugging their devices into the cloud  (Top Considerations When Auditing Cloud Computing Systems)

Top Considerations When Auditing Cloud Computing Systems

As today’s organizations migrate to the cloud, they expose themselves to a rapidly growing threat landscape. As if ... Read More The post Top Considerations When Auditing Cloud Computing Systems appeared first ...
A vector illustration of a CISO stopping info sec threats with a shield.

Why Infosec Compliance Governance Should Be a Top Priority for CISOs

This is a guest post authored by Dr.Kenneth Cooper, CTO and Co-founder of Datapoint Solutions Consulting. The job ... Read More The post Why Infosec Compliance Governance Should Be a Top Priority ...

Canada’s New Data Privacy Bill: the Digital Charter Information Act

On November 17, the Canadian government introduced Bill C-11, better known as the Digital Charter Implementation Act, which will see the North American country make amendments to its data privacy policies. It ...
A vector character walks by a book shelf and computer screen which says controlled unclassified information CUI

What Exactly is CUI? (and How to Manage It)

It certainly sounds official—like it might be the subject of the next action-packed, government espionage, Jason Bourne-style thriller. ... Read More The post What Exactly is CUI? (and How to Manage It) ...