The latest edition of the ISMG Security Report analyzes the hacking of Dave, a mobile banking app. Plus: Sizing up the impact of GDPR after two years of enforcement and an assessment of IIoT vulnerabilities.
In this new era, every enterprise is suddenly "cloud first." But there are significant data security gaps to avoid before putting critical data in the cloud. Imperva's Terry Ray shares strategies to maximize simplicity and regulatory compliance.
Within weeks of the California Consumer Privacy Act of 2018 going into effect, the first CCPA lawsuit was filed in U.S. District Court in Northern California, based on a personal data breach of a retailer and its cloud service provider. Since then, many lawsuits have been filed, addressing multiple aspects of...
It is a lot for IT teams to handle a remote workforce. Keeping up with security issues, maintaining data compliance, and minimizing data loss are some of the challenges IT teams are facing today.
In this webinar, we will cover how IT and security teams can empower end-users working remotely by increasing their...
Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning."
"The CCPA is just the U.S. version of the GDPR."
"If I'm compliant with the GDPR, I'm also compliant with the CCPA."
"Personal data under GDPR is the same as personal information under CCPA."
All of this common wisdom about the GDPR and CCPA is arguably false. In fact, there are numerous differences, some...
To understand and illustrate the benefits, costs, and risks associated with ServiceNow, Forrester interviewed six current Governance, Risk, and Compliance customers to create a representative organization. This organization:
Performed compliance testing and reporting 70% faster
Completed vendor assessments 3 times...
From cutting costs to reducing risks and problems, there are many benefits to automating GRC.
But, what are the simplest ways to maximize value and minimize costs during implementation?
Check out the 8 simple steps for automating GRC and learn how to create a GRC roadmap that:
Scales with your...
The financial and legal penalties that could result from noncompliance make it imperative to invest in transforming outdated GRC processes.
Through continuous monitoring and automation you can improve decision making, increase performance across your organization, and respond to business risks in real-time.
The cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed to exploit the cybersecurity skills shortage, along with congenitally poor security fundamentals and hygiene.
When large-scale data breaches started to proliferate more than a decade ago, security leaders called for end-to-end data encryption. But that approach no longer suffices, says First Data's Tim Horton, who calls for a new multilayered defense.
The EMV 3D Secure specification faces some milestone dates in Europe and the U.S. What are these milestones, and how does the standard fit into fundamental fraud defenses? Jackie Hersch of Fiserv shares insight.
After months of appeals, Facebook has agreed to pay $643,000 to settle claims that it violated U.K. privacy laws by allowing Cambridge Analytica - a now-defunct digital marketer that focused, in part, on political campaigns - to access the personal data of 87 million of its users.