Why an Evolved Security Strategy is Critical Jordan Mauriello, Chief Technology Officer of Critical Start, discusses how the operational model of legacy managed security service providers (MSSPs) can actually leave organizations more vulnerable to cyberattacks, increasing the risk of security...
Read moreWhat’s Next in Data Protection Laws The GDPR went into effect at the end of May, and California could be preparing to sign a similar regulation into law in November. The California Consumer Privacy Act (CCPS) mimics the heavy regulation...
Read more8 Tips to Strengthen Your Data Security Practices The more often data is handled, the greater the risk of a compliance failure, and some of the most sensitive data is entrusted to an industry that struggles to protect it sufficiently....
Read more4 Key Criteria to Consider When Evaluating Solutions The EU General Data Protection Regulation is now officially in effect. If your organization transacts with individuals and businesses on a global scale and is looking to implement e-signatures, ensure the solutions...
Read moreUsing Tech to Streamline Compliance Efforts Data collection and monitoring tools now make it easier to access information quickly, but only if your company has the right content management and e-communications system in place. Rather than leaving the decision as...
Read moreBest Practices for Data Integrity, Collection and Reporting Ajay Khanna of Reltio explores the four primary data challenges facing the health care industry today – fragmented data, ever-changing data, privacy and security regulations and patient expectations – and provides advice...
Read moreFor GDPR Compliance, Take These Steps If you’re not already compliant with the General Data Protection Regulation (GDPR), you’re already behind the 8 ball. But don’t despair; your organization can get up to speed, one step at a time. Maxine...
Read moreKey Considerations When Choosing a Solution Security embedded in an SD-WAN-enabled appliance cannot simply be downgraded to perfunctory specs and held hostage to SD-WAN’s greater mission of pushing packets through pipes as seamlessly as possible. In today’s cyber-threat environment, SD-WAN-plus-security...
Read moreHow to Achieve Compliance Greg Sparrow addresses the issues of the General Data Protection Regulation (GDPR) and preventative actions that must be taken to ensure organizational compliance. Through a "GDPR Readiness Survey" sponsored by CompliancePoint, Greg touches on the research...
Read moreThe Technology Disrupting the Health Care Industry Blockchain tech is disrupting multiple industries, and perhaps none more so than health care. Organizations using the technology for storing medical records are experiencing the benefit of complete data security, of course. Another...
Read moreLessons From The Giant While not every organization is a nearly 2 billion user, social media giant like Facebook, there’s a lesson to be learned for all organizations from recent events: in today’s data-driven business environment, customer trust matters more...
Read moreDeloitte’s Satish Lalchand outlines steps organizations can take to prepare an effective foundation for analytics-driven investigations and fraud monitoring, in the second installment of an article series on the future of forensics. In recent years, traditional corporate antifraud measures have...
Read moreFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2024 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |