Organizations often think about cyber defenses in terms of hardware upgrades, software updates and cybersecurity tools. Boards want something tangible when they allocate resources, but the truth is that people are by far a company's weakest link. Hacking complex systems...
Read moreDetailsSpring has sprung, which means it’s time to get your data house in order. As an organization’s most valuable asset, data should be cared for and integrated, managed, archived, deleted as appropriate. Join Onna, Georgia Pacific, and Sanofi and watch...
Read moreDetailsA new administration in the White House is always synonymous with change. In the aftermath of four years of active deregulation; however, it’s likely to be a whole new world for legal and compliance teams. As the Biden administration moves...
Read moreDetailsTowerwall’s Michelle Drolet discusses the two threads of SOC 2 compliance (types 1 and 2), outlines the Trust Services Criteria, and details the benefits of adhering to these standards. While Service Organization Control (SOC) 2 compliance isn’t mandatory, it can...
Read moreDetailsEmail phishing is at its highest level in three years, and one of the latest lines of attack capitalizes on the strict rules of GDPR, targeting executives and public-facing emails at businesses. Valimail’s Seth Blank examines how to protect your...
Read moreDetailsOn Data Privacy Day, Kroll’s Alan Brill and Brian Lapidus share recommendations for companies who have fallen victim to ransomware attacks, emphasizing the importance of reporting a breach promptly and how to investigate an attack under the assumption that data...
Read moreDetailsLMG Security’s Madison Iler discusses how to structure a vendor risk management program (and where to spend your time) and shares common missteps that can reduce program effectiveness. As evidenced by the recent far-reaching SolarWinds breach, supply chain attacks represent...
Read moreDetailsAs unpleasant an option as it is, victims of ransomware attacks often just pay up in order to recover sensitive data. Nutter’s Seth Berman and James Gately offer an alternative. Ransomware attacks hit suddenly and without apparent warning. One morning,...
Read moreDetailsThe role of SOC 2 compliance in securing your data can’t be overstated. Strike Graph CEO Justin Beals discusses how to find the right audit partner – one who meets your needs as they test the operational effectiveness of your...
Read moreDetailsKnowBe4’s Chief Evangelist and Security Officer, Perry Carpenter, discusses how to protect your organization’s data from an often-overlooked risk. Sponsored Organizations set up all sorts of technology-driven safeguards to help them protect their own and their customers’ data. These investments...
Read moreDetailsKnowBe4’s Stu Sjouwerman offers a peek into the ways of a cybercriminal, providing organizations unique insights into how they can strengthen their cybersecurity strategy. With everything digital becoming automated and connected, a cyber pandemic could spread faster than a biological...
Read moreDetailsFollowing a recent advisory from the Office of Foreign Assets Control, attorneys from Manatt, Phelps & Phillips consider the difficulty of paying ransomware attackers’ ransoms without violating U.S. sanctions law. Picture this: At some point in the next six months,...
Read moreDetailsFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2025 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |