Getting hit by a ransomware attack can throw your week, if not your month or your year, into disarray. But depending on the breach, you might have several viable paths forward to recover your data. You might even be able...
Read moreData security principles codified in cybersecurity protocols like GDPR, CCPA, PCI DSS and others are raising protection standards. They also spell more work for software developers. Managers, meanwhile, must decide whether to prioritize security in an unstable economy.
Read moreAn IT-centric network perimeter security model is increasingly insufficient to protect your organization from cyberattacks. Onclave Networks’ Scott Martin advocates a “zero trust” approach to security as a means of reinforcing defenses. Sponsored The rise in cyberattacks and ransomware has...
Read moreGovernment contractors will soon need to obtain CMMC certification, but there are currently just a few C3PAO accreditors that can confer it. Tony Bai, federal practice lead at A-LIGN, emphasizes companies shouldn't panic due to the logistical bottleneck. They can...
Read moreAs organizations claw their way back from the global pandemic, every penny has to be justified. But the threat of a cyberattack is too important to ignore. Implementing an integrated security architecture can help your infosec team consolidate functions and...
Read moreWhile organizations around the world are coming to terms with ransomware, a new cyberthreat is growing in popularity. Extortionware attacks can affect both organizations and individuals, and may continue to pose a risk long after defenses have been breached.
Read moreSolarWinds is regarded as the widest-reaching cyber espionage operation against the United States government to date. Dan Verton discusses what we know so far and actions other businesses and organizations should consider in an effort to mitigate the effects of...
Read moreOrganizations often think about cyber defenses in terms of hardware upgrades, software updates and cybersecurity tools. Boards want something tangible when they allocate resources, but the truth is that people are by far a company's weakest link. Hacking complex systems...
Read moreSpring has sprung, which means it’s time to get your data house in order. As an organization’s most valuable asset, data should be cared for and integrated, managed, archived, deleted as appropriate. Join Onna, Georgia Pacific, and Sanofi and watch...
Read moreA new administration in the White House is always synonymous with change. In the aftermath of four years of active deregulation; however, it’s likely to be a whole new world for legal and compliance teams. As the Biden administration moves...
Read moreTowerwall’s Michelle Drolet discusses the two threads of SOC 2 compliance (types 1 and 2), outlines the Trust Services Criteria, and details the benefits of adhering to these standards. While Service Organization Control (SOC) 2 compliance isn’t mandatory, it can...
Read moreEmail phishing is at its highest level in three years, and one of the latest lines of attack capitalizes on the strict rules of GDPR, targeting executives and public-facing emails at businesses. Valimail’s Seth Blank examines how to protect your...
Read moreFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2024 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |