In 2022, nations and organizations around the world will continue working to protect customer data against hackers and accidental breaches. From new international regulations to artificial intelligence, here is a look at how cyber compliance is shifting priorities. We often...
Read moreDetailsIt’s no secret that the volume of data created by organizations and people multiplies daily. That data is spread across more tools, platforms, devices and clouds than ever before, creating regulatory challenges and security risk. This article looks at simplifying...
Read moreDetailsMultiple factors are pushing ransomware, including growing attack patterns that include double and triple extortion, criminal business models taking advantage of ransomware, cryptocurrencies and wave of supply chain attacks During the COVID-19 crisis, another outbreak took place in the cyber...
Read moreDetailsCyber insurer Allianz Global Corporate & Specialty (AGCS) analyzes risk developments around ransomware in its report, Ransomware Trends: Risk and Resilience. The report explores statistics surrounding ransomware, concluding that many factors point to ransomware attacks being here to stay, including...
Read moreDetailsCybersecurity failures can happen to any company and anyone. But tactics that fight human nature increase the chances of failure. The best defense strategies meet employees where they are, measure outcomes, and update accordingly.
Read moreDetailsGetting hit by a ransomware attack can throw your week, if not your month or your year, into disarray. But depending on the breach, you might have several viable paths forward to recover your data. You might even be able...
Read moreDetailsData security principles codified in cybersecurity protocols like GDPR, CCPA, PCI DSS and others are raising protection standards. They also spell more work for software developers. Managers, meanwhile, must decide whether to prioritize security in an unstable economy.
Read moreDetailsAn IT-centric network perimeter security model is increasingly insufficient to protect your organization from cyberattacks. Onclave Networks’ Scott Martin advocates a “zero trust” approach to security as a means of reinforcing defenses. Sponsored The rise in cyberattacks and ransomware has...
Read moreDetailsGovernment contractors will soon need to obtain CMMC certification, but there are currently just a few C3PAO accreditors that can confer it. Tony Bai, federal practice lead at A-LIGN, emphasizes companies shouldn't panic due to the logistical bottleneck. They can...
Read moreDetailsAs organizations claw their way back from the global pandemic, every penny has to be justified. But the threat of a cyberattack is too important to ignore. Implementing an integrated security architecture can help your infosec team consolidate functions and...
Read moreDetailsWhile organizations around the world are coming to terms with ransomware, a new cyberthreat is growing in popularity. Extortionware attacks can affect both organizations and individuals, and may continue to pose a risk long after defenses have been breached.
Read moreDetailsSolarWinds is regarded as the widest-reaching cyber espionage operation against the United States government to date. Dan Verton discusses what we know so far and actions other businesses and organizations should consider in an effort to mitigate the effects of...
Read moreDetailsFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2025 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |