All Data Privacy articles – Page 38

  • ExecutiveSilhouettePhone
    Article

    Fending off executive impersonation schemes

    2016-10-12T09:30:00Z

    Everybody thinks they would never fall for an obvious cyber-scam … until they do. Jaclyn Jaeger reports.

  • Blog

    HPE, Iron Mountain form alliance

    2016-10-03T09:30:00Z

    Hewlett Packard Enterprise has formed a strategic collaboration with Iron Mountain, a storage and information management services firm, to help organizations automate the application and execution of legal policy against their content and information repositories.

  • Blog

    There simply are not enough cyber-security specialists

    2016-09-27T10:30:00Z

    Companies need to get much more aggressive when it comes to recruiting the right talent to head their cyber-security efforts, writes John Reed Stark.

  • Article

    How data analytics is changing the face of compliance

    2016-09-07T12:30:00Z

    Compliance and risk officers are increasingly using data analytics to prevent and detect bribery and corruption risk, as well as enjoy cost and operational efficiencies. Jaclyn Jaeger explores.

  • Article

    Amid corruption scandals, compliance booms in Brazil

    2016-08-09T12:45:00Z

    It might seem that corruption scandals are one of Brazil’s leading exports this year, but amid renewed government anti-bribery enforcement efforts, the country’s compliance sector is growing by leaps and bounds. Rodrigo Amaral has more.

  • Blog

    Business associate to pay $650K for HIPAA violation

    2016-07-27T12:15:00Z

    The Department of Health and Human Services reached its first-ever enforcement action with a “business associate” of a HIPAA-covered entity. Compliance officers in the healthcare industry looking to minimize risk of future HIPAA violations will want to take a look at the resulting corrective action plan for lessons learned. Jaclyn ...

  • Article

    This is not a game: Scenario planning can help protect your organization’s reputation

    2016-07-26T11:30:00Z

    With some 4,000 cyber-attacks occurring every day, compliance officers are looking for any solution to help protect their organization from cyber-risk. A method worth considering is wargaming: a simulation that provides a live example of what a cyber-attack might look like and illustrates what can be to better protect the ...

  • Blog

    K2 Intelligence names head of U.S. business investigations practice

    2016-07-26T10:30:00Z

    K2 Intelligence, an investigative, compliance and cyber-defense services firm, has appointed Snežana Gebauer as executive managing director and head of the U.S. business investigations and intelligence practice.

  • PrivacyShield
    Article

    EU-U.S. Privacy Shield passes: Now what?

    2016-07-26T09:15:00Z

    For any U.S. company that collects and handles data on EU citizens, the time to review privacy policies, practices and contracts with service providers and customers is now. Jaclyn Jaeger has more.

  • Article

    Preparing for the new EU cyber-security directive

    2016-07-19T13:45:00Z

    The European Parliament has greenlit an EU-wide cyber-security initiative that will impose plenty of new compliance requirements on organizations across the board. But, queries Jaclyn Jaeger, will compliance officers feel these are helping protect their organizations, or just adding another layer of regulatory liability?

  • Article

    In cyber-security, the real enemy strikes from within

    2016-07-19T11:45:00Z

    While organizations are trying to understand their cyber-risk and how best to address it, focusing on external threats can overlook an even greater problem, say guest contributors Mark Dorosz and Jennifer Benson: security flaws from internal employees who don’t understand, or don’t care, about upholding the organization’s defenses.

  • Blog

    PhishMe adds healthcare compliance training modules

    2016-07-08T12:30:00Z

    PhishMe, a global provider of phishing defense and intelligence solutions for the enterprise, announced the immediate availability of three new, complimentary computer-based trainings, accessible through the Phis hMe CBFree program. These modules provide employees with a better understanding of the policies, procedure, and reporting when handling protected personal information.

  • Blog

    New solution helps companies reclaim lost data

    2016-06-17T15:00:00Z

    Ground Labs, a global security software company, announced the release of Enterprise Recon 2.0. The solution scans for 100 different data points and personally identifiable information, allowing organizations to protect critical information at every endpoint without relying on antiquated perimeter security methods.

  • Blog

    CipherCloud unveils GDPR-ready cloud security solution

    2016-06-17T14:45:00Z

    CipherCloud, a cloud security company, announced the availability of the industry’s first cloud security solution designed to help companies comply with the European General Data Protection Requirement (GDPR).

  • Blog

    Cyber-security due diligence: a new imperative

    2016-06-07T10:00:00Z

    Weak cyber-security is as much a hallmark of corporate mismanagement as poor corporate governance, bad tone from the top, and check-the-box compliance. But by taking the due diligence aspects of cyber-security seriously, compliance officers can turn data protection into an opportunity. John Reed Stark has more.

  • Blog

    K2 Intelligence partners with BitVoyant

    2016-05-20T15:15:00Z

    K2 Intelligence, a cyber defense, investigative, and compliance services firm, and BitVoyant, a cyber intelligence services company, has announced a new partnership to co-develop cyber-derived business intelligence products and defense services based on massive proprietary cyber datasets.

  • Article

    The many facets of a data breach

    2016-05-17T20:00:00Z

    Every industry faces the threat of a data breach, but how those breaches are actually carried out can vary significantly industry to industry. Jaclyn Jaeger explores how companies can better focus their security efforts on the most vulnerable areas.

  • Blog

    LockPath Joins Cloud Security Alliance

    2016-05-17T09:00:00Z

    LockPath, a provider of GRC solutions, has joined the Cloud Security Alliance, a non-profit group that promotes best practices for securing cloud computing.

  • Blog

    SEC's former AMU co-chief Marshall Sprung joins Blackstone Group

    2016-05-15T22:30:00Z

    Marshall S. Sprung, former co-chief of the SEC Division of Enforcement’s Asset Management Unit since 2013, is reportedly joining Blackstone Group LP as the firm's global head of compliance. As emphasized in a speech last week by SEC Enforcement Director Andrew Ceresney, the Enforcement Division has recently increased its scrutiny ...

  • Blog

    IntelliChief Analytics offers workflow visibility

    2016-05-05T12:15:00Z

    IntelliChief, a provider of automated document management and workflow enterprise content management (ECM) solutions, has launched IntelliChief Analytics, a multicultural/multilingual-supporting business intelligence platform enabling complete visibility to live documentation in IntelliChief ECM.