Blog
Page 58 of 152
CCPA vs. GDPR: Compliance Comparison
While the CCPA may seem like the US version of GDPR, the two have some significant differences that businesses should understand.
September 23, 2022
What to Include in Your Compliance Automation Checklist
The burdens of compliance are heavy. How heavy, exactly? According to one 2020 study, compliance costs consume 40 percent of IT security budgets – but ignoring compliance is decidedly not an option, since that path can result in revenue losses, hefty fines, business disruptions, and reputational damage. One way for organizations to keep pace with […]
September 22, 2022
What is Vendor Risk Management (VRM)? The Definitive Guide
Understanding the basic need for and principles of vendor risk management can help you secure your data and lower the likelihood of a data breach.
What the SEC’s Proposed New Cyber Risk Reporting Rules Mean For You
Earlier this year, SEC Chair Gary Gensler proposed new rules about the handling and reporting of cyber risk and breaches. The proposal is trying to bring some consistency and timeliness to reporting because, despite the previous 2011 and 2018 guidance, the reporting was frequently delayed or didn’t have sufficient details. Primary changes would include a […]
September 20, 2022
What Is Security Orchestration?
Modern cybersecurity and security operations center teams must be constantly vigilant to detect threats, respond to security events, and mitigate risk. They must also work with multiple security solutions to protect the organization from threat actors. Even for experienced security personnel, however, that work is easier said than done. It is not easy for security […]
September 16, 2022
The Importance of Data Governance in the Insurance Industry
Data governance matters in every industry because it helps to establish data accuracy, reliability, integrity, and security – but it is especially important in the insurance world, since insurance providers are privy to vast amounts of personally identifiable or otherwise sensitive data. A data breach lets hackers misuse stolen insurance data for criminal purposes such […]
The Benefits of Security Automation
The world is embracing digital transformation, where software and automation mean less human support is necessary to perform repetitive tasks in a business process. Security automation is no different; we’ve seen massive automation in security in recent years, and that trend continues unabated. Let’s explore security automation in detail and determine whether it’s time for […]
What are the Benefits of Integrated Risk Management and Strategic Planning?
What Is Integrated Risk Management? Integrated risk management (IRM) is a more disciplined approach to risk management. It uses technology to identify threats and the steps you take to control those risks. It gives senior leaders at the organization better insight into which threats pose the greatest danger, so they can make better decisions about […]
Tags: Risk Management
Why Third-Party Risk Is Critical to Every Business
Every organization, whether a startup or global enterprise, works with multiple vendors, using their software and relying on their systems – and yet, while these external vendors provide invaluable services, they also introduce significant risk to your company’s information security. The issue is this: How do you know if your third-party business partners are meeting […]
Reduce Risk Using Cyber Assurance Programs
5 EXAMPLES OF HOW TO GAIN BETTER INSIGHT INTO THE RISKS OF YOUR STRATEGIC BUSINESS PRIORITIES 77% of global companies report an increase in threats to their business. 1 Yet, executives say it’s organizational complexity that poses “concerning” cyber and privacy risks. To solve, they need to better prioritize IT and cyber risk across their […]
September 15, 2022
Page 58 of 152