The Biden Administration and DOJ intend to pursue cyber fraud through the False Claims Act (FCA), with an emphasis on whistleblower reporting. The implications could devastating for unsuspecting health care compliance teams and lead to multiple exposures to enforcement.
Read moreDetailsNew rules proposed by the Securities Exchange Commission could change the way the advisors and funds communicate cyber risk to investors. If adopted, funds would be required to maintain records of cybersecurity polices and procedures, and report incidents within a...
Read moreDetailsYou know the resources and commitment required for a successful cybersecurity program. But your company's leaders might not. Communicating what they need to know calls for both art and science. Arm yourself with data, common language and a pitch that...
Read moreDetailsSince last year's Data Privacy Day, system down times have continued to lengthen. Cyber insurance has continued to grow more expensive. AI remains a double-edged sword. As always, awareness training and security protocols serve the best shields in the ongoing...
Read moreDetailsIn 2022, nations and organizations around the world will continue working to protect customer data against hackers and accidental breaches. From new international regulations to artificial intelligence, here is a look at how cyber compliance is shifting priorities. We often...
Read moreDetailsIt’s no secret that the volume of data created by organizations and people multiplies daily. That data is spread across more tools, platforms, devices and clouds than ever before, creating regulatory challenges and security risk. This article looks at simplifying...
Read moreDetailsMultiple factors are pushing ransomware, including growing attack patterns that include double and triple extortion, criminal business models taking advantage of ransomware, cryptocurrencies and wave of supply chain attacks During the COVID-19 crisis, another outbreak took place in the cyber...
Read moreDetailsCyber insurer Allianz Global Corporate & Specialty (AGCS) analyzes risk developments around ransomware in its report, Ransomware Trends: Risk and Resilience. The report explores statistics surrounding ransomware, concluding that many factors point to ransomware attacks being here to stay, including...
Read moreDetailsCybersecurity failures can happen to any company and anyone. But tactics that fight human nature increase the chances of failure. The best defense strategies meet employees where they are, measure outcomes, and update accordingly.
Read moreDetailsGetting hit by a ransomware attack can throw your week, if not your month or your year, into disarray. But depending on the breach, you might have several viable paths forward to recover your data. You might even be able...
Read moreDetailsData security principles codified in cybersecurity protocols like GDPR, CCPA, PCI DSS and others are raising protection standards. They also spell more work for software developers. Managers, meanwhile, must decide whether to prioritize security in an unstable economy.
Read moreDetailsAn IT-centric network perimeter security model is increasingly insufficient to protect your organization from cyberattacks. Onclave Networks’ Scott Martin advocates a “zero trust” approach to security as a means of reinforcing defenses. Sponsored The rise in cyberattacks and ransomware has...
Read moreDetailsFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2026 Corporate Compliance Insights
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |