With over 80 percent of data breaches resulting from compromised passwords, biometric authentication systems emerge as a solution to avoid multimillion-dollar losses, hefty fines and burdensome management of multiple complex passwords. ImageWare’s David Harding discusses. Passwords don’t work anymore; in...
Read moreIn 2018, with the General Data Protection Regulation going into effect, data security finally secured a spot in the boardroom. SoftwareONE’s Mike Fitzgerald discusses takeaways for compliance practitioners in the year that’s passed since. After years of IT professionals arguing...
Read moreMost organizations’ security and data protection efforts are seriously lacking – particularly when it comes to the human element. Abacus Group’s Jonathan Bohrer outlines three components of a successful cyber compliance program: education, protection and monitoring. Hardware, software, networks and...
Read moreThe CCPA, which goes into effect in six months, will cover data beginning in January 2019, so the time to prepare is now. Aparavi’s CTO Rod Christensen discusses the steps companies must take to ensure compliance as soon as possible....
Read moreBusinesses need to manage large numbers of network-connected devices, but how much control do we really have on our technology assets? Nlyte’s Mark Gaydos provides highlights from a recent Nlyte survey on how managers control assets now and what’s changing....
Read moreInterconnected with the rise of AI is the growth of the IoT, which is already transforming businesses. Mayer Brown’s Linda Rhodes and Charles King III cover not only the rise of IoT, but also the risks of such technology. The internet...
Read moreThe new California Consumer Privacy Act (CCPA) is shaping up to be the toughest privacy law in the U.S. Nymity’s Chief Global Privacy Strategist, Teresa Troester-Falk, discusses what organizations need to do to adapt to the changing U.S. privacy law...
Read moreEvery company should be expecting a security breach at some point. MetricStream’s Vibhav Agarwal discusses the importance of tackling cybersecurity directly and what risk-focused executives must do to avoid disaster and position their organizations for success. In a world where...
Read moreIll-crafted privacy policies can put a company and its customers’ data at significant risk. Cozen O’Connor’s Brian Kint examines five of the most common ways an organization’s policy could be lacking and provides solutions for how to remedy those issues....
Read moreTrustArc CEO Chris Babel highlights findings and themes from a recent report on the California Consumer Privacy Act and offers guidance on building an effective program for those organizations still at work on CCPA compliance. The European Union’s (EU) General...
Read moreMany corporate leaders are hesitant to move to the cloud because of security concerns. netlogx’s Clayton Calvert explains that while data breaches are continuing apace, cloud security is entirely possible and manageable. Cloud adoption has continued to grow in the...
Read moreHanzo’s Jim Murphy explores the danger of Slack data; voluminous, informal, unstructured and context-dependent, it’s a threat hiding in plain sight at thousands of organizations, and often it’s only in the course of an investigation or e-discovery matter (when it’s...
Read moreFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2024 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |