news analysisUnderstanding CISA's proposed cyber incident reporting rulesCISA’s massive rulemaking will create the first US cyber incident and ransomware payment reporting mechanism that promises to radically overhaul the workloads of most cybersecurity professionals.By Cynthia BrumfieldApr 17, 202410 minsRegulationRansomwareCyberattacks feature General Data Protection Regulation (GDPR): What you need to know to stay compliantBy Michael NadeauApr 04, 202421 minsComplianceData and Information SecurityPrivacyfeature Why governance, risk, and compliance must be integrated with cybersecurityBy Rosalyn PageFeb 29, 202410 minsComplianceRisk Management newsBigID adds access governance targeted at sensitive data and privilegesBy Shweta Sharma Feb 15, 20244 minsComplianceIT Governance featureCyber Trust Mark concept gains momentum with smart device and IoT manufacturersBy Chris Hughes Feb 06, 20249 minsSecurity HardwareComplianceSecurity Practices news analysisUS DOD's CMMC 2.0 rules lift burdens on MSPs, manufacturersBy John P. Mello Jr. Jan 05, 20245 minsRegulationSupply ChainCompliance featureNew risk management framework helps with SEC mandate complianceBy Brian Allen and Brandon Bapst Jan 04, 202410 minsRegulationComplianceRisk Management featureHow the EU AI Act regulates artificial intelligence: What it means for cybersecurityBy Andrada Fiscutean Dec 13, 202312 minsRegulationGenerative AICompliance featureThe SEC action against SolarWinds highlights how tough it can get for CISOsBy Susan Bradley Dec 12, 20236 minsCSO and CISORegulationCyberattacks ArticlesfeatureAccenture takes an industrialized approach to safeguarding its cloud controlsSecurity was once a hindrance for Accenture developers. But since centralizing the company's compliance controls, the process has never been simpler.By Aimee Chanthadavong Dec 11, 2023 8 minsApplication SecurityCloud SecurityCompliancefeatureHow a digital design firm navigated its SOC 2 auditL+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits.By Alex Levin Nov 28, 2023 11 minsCertificationsCompliancefeatureRise of the cyber CPA: What it means for CISOsNew accountant certification rules starting January 2024 could deliver many new cybersecurity-trained accountants. Is this good or bad news for CISOs?By Evan Schuman Nov 27, 2023 7 minsCSO and CISOCompliancenews analysisRansomware gang files SEC complaint against company that refused to negotiateNew US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.By Lucian Constantin Nov 17, 2023 4 minsRansomwareComplianceCybercrimefeatureHow US SEC legal actions put CISOs at risk and what to do about itCISOs could find themselves in a painful Catch-22 situation when the US Securities and Exchange Commission’s new cybersecurity rules are enacted in December. By Evan Schuman Nov 16, 2023 8 minsCSO and CISOComplianceRisk ManagementnewsGenerative AI could erode customer trust, half of business leaders sayBusinesses leaders admit their company needs to improve security and compliance measures as demands of customers, investors, and suppliers increase.By Michael Hill Nov 08, 2023 4 minsCSO and CISOGenerative AICompliancenewsUS launches “Shields Ready” campaign to secure critical infrastructureShields Ready initiative outlines strategies for preparing critical infrastructure organizations for potential disruption and building more resilience into systems, facilities, and processes.By Michael Hill Nov 08, 2023 3 minsGovernmentComplianceCritical InfrastructurenewsAuditBoard adds new AI and analytics capabilities for compliance and risk maWith the new AI algorithms, organizations will be able to streamline audit workflows and automate various risk management and compliance programs.By Shweta Sharma Oct 18, 2023 3 minsGenerative AIComplianceRisk ManagementnewsVanta bakes generative AI into core security and compliance productNew generative AI capabilities are coming to security and compliance vendor Vanta’s main platform, adding a layer of automation to compliance tasks.By Jon Gold Oct 10, 2023 3 minsGenerative AIComplianceRisk ManagementnewsCybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirementsOpen letter claims current provisions will create new threats that undermine the security of digital products and individuals.By Michael Hill Oct 03, 2023 4 minsRegulationComplianceVulnerabilitiesnewsOnline Safety Bill passes final parliament debate, set to become UK lawDespite widespread criticism and scrutiny, the UK government is within touching distance of delivering its controversial new internet safety rules.By Michael Hill Sep 20, 2023 3 minsEncryptionCompliancePrivacynews analysisCyber-related False Claims actions are on the uptickVerizon's $4 million settlement with the US DOJ signals stepped-up action by the Justice Department's Civil Cyber-Fraud initiative.By Cynthia Brumfield Sep 18, 2023 7 minsRegulationComplianceSecurity Practices Show more Show less View all Resources whitepaper Wipro and AWS: Solving the challenge of continuous compliance in today’s enterprise Join us as experts from Wipro and AWS explore the situation, the challenges, and their joint solutions for maintaining continuous compliance. The post Wipro and AWS: Solving the challenge of continuous compliance in today’s enterprise appeared first on Whitepaper Repository –. By AWS and Wipro 13 Jun 2024Business OperationsComplianceSecurity View all Video on demand videoAligning security, compliance and privacy across inventory trackingBrad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD’s most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. May 28, 2021 20 minsComplianceData and Information SecurityPrivacy See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis Secure Boot no more? Leaked key, faulty practices put 900 PC/server models in jeopardy By Lucian Constantin Jul 26, 20247 mins Vulnerabilities news Counting the cost of CrowdStrike: the bug that bit billions By Shweta Sharma Jul 26, 20241 min Business ContinuityEndpoint Protection how-to Download the unified endpoint management (UEM) platform enterprise buyer’s guide By Bob Violino Jul 26, 20241 min Mobile SecurityEndpoint ProtectionEnterprise Buyer’s Guides podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) Jul 17, 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO