Reducing misconfigurations, monitoring malicious activity, and preventing unauthorized access are foundational activities necessary to ensure security and compliance of applications and data in the cloud. As criminals become more sophisticated in their abilities to exploit cloud misconfiguration vulnerabilities,...
The California Consumer Privacy Act (CCPA) is intended to provide
Californian citizens with the right to know when their personal data is being collected,
whether their personal data is being disclosed or sold, and to whom.
This paper outlines data security solutions that can help your organization meet data...
This guide is for CISOs who want to understand whether their
companies are impacted by the new regulation, how it impacts them,
and what steps their teams can take to comply with GDPR data
security requirements. You'll learn:
The basic framework, intent, and extent of the GDPR
Which companies are affected
The latest edition of the ISMG Security Report analyzes the hacking of Dave, a mobile banking app. Plus: Sizing up the impact of GDPR after two years of enforcement and an assessment of IIoT vulnerabilities.
In today's digital-first world, businesses subject to KYC requirements must find a way to create onboarding and authentication processes that achieve compliance and inhibit fraud, without alienating good customers. Time and again, research shows that overly cumbersome and time consuming processes turn good customers...
In this new era, every enterprise is suddenly "cloud first." But there are significant data security gaps to avoid before putting critical data in the cloud. Imperva's Terry Ray shares strategies to maximize simplicity and regulatory compliance.
Now more than ever we continue to hear about cloud security lapses and high-profile breaches in the news. However, if you dig deeper into the details behind each of these breaches, you'd find that many vulnerabilities could have been avoided if the cloud environment was configured according to cloud security best...
If your organization handles online transactions with European citizens the eIDAS Regulation presents significant opportunities, but also creates new requirements.
nShield hardware security modules (HSMs) play a vital role in helping to secure eIDAS-compliant solutions that require digital certificates, time...
It is a lot for IT teams to handle a remote workforce. Keeping up with security issues, maintaining data compliance, and minimizing data loss are some of the challenges IT teams are facing today.
In this webinar, we will cover how IT and security teams can empower end-users working remotely by increasing their...
Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning."
Compliance has long been a fact of life for IT and security teams. Compliance regulations originated as efforts to ensure data security and have since mushroomed into constantly changing and overwhelming challenges that consume disproportionate amounts of an organization's resources.
In this whitepaper, you'll...
The cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed to exploit the cybersecurity skills shortage, along with congenitally poor security fundamentals and hygiene.
When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption. But that approach no longer suffices, says First Data's Tim Horton, who calls for a new multilayered defense.
The EMV 3D Secure specification faces some milestone dates in Europe and the U.S. What are these milestones, and how does the standard fit into fundamental fraud defenses? Jackie Hersch of Fiserv shares insight.