All Data Privacy articles – Page 40
-
Blog
Kroll names global cyber-security practice leader
Kroll, a global risk mitigation, compliance, security, and incident response solutions firm, has appointed Jason Smolanoff as senior managing director, global cyber-security practice leader. Smolanoff brings to Kroll more than 16 years of federal law enforcement and information security experience.
-
Blog
Some key cyber-security tips for financial firms
As the SEC and FINRA are taking cyber-security much more seriously, John Reed Stark outlines a few ways in which financial firms can also do more to protect their data.
-
Blog
K2 Intelligence regulatory compliance practice expands its team
K2 Intelligence, an investigative, compliance, and cyber-defense services firm, has named Nathan Ploener as a managing director in the firm’s regulatory compliance practice.
-
Article
Global business in Trump’s protectionist era
Trump’s election, Brexit, and failed trade agreements herald a new era of protectionism, but only strong regulations can deal with data protection and tax evasion, writes Nick Henderson.
-
Article
New York’s proposed cyber-security compliance challenge
Starting in January, strict new rules form the Empire State will require compliance officers to make sure their organizations make the grade when it comes to data protection. More from Todd Taylor.
-
Blog
Cordium names VP of cyber-security and data protection services
Cordium, a GRC services provider to financial and professional services firms, has appointed Richard Hudson as vice president of its cyber-security and data protection consulting services.
-
Blog
Resilient helps companies respond to cyber-attacks
Resilient, an IBM company, released the industry’s first Dynamic Playbook for ransomware, aimed at helping organizations globally respond effectively to this growing type of cyber-attack.
-
Blog
Unisys Stealth helps companies fight cyber-crime
Unisys, a global information technology company, has announced the launch of Stealth(aware), a new Unisys Stealth software application that helps companies in the fight against cyber-crime.
-
Article
Internet of Things ramp-up expands compliance risk considerations
Companies are lacking at providing security testing for products manufactured with Internet of Things, reports David Bogoslaw.
-
Article
Before M&A, think cyber: what every board needs to know
Nothing can sideline a merger or acquisition quite so well as dodgy cyber-security compliance. Simone Petrella discusses what every board should know in advance.
-
Article
Better cyber-security through better cyber-compliance training
The Achilles’ heel of every cyber-security program is compliance. Javvad Malik offers some tips on how the right kind of training can fix that.
-
Blog
TrapX releases deception-based security solution
TrapX, a deception-based cyber-security defense provider, recently released the world’s first deception-based security solution specifically designed to protect the Society for Worldwide Interbank Financial Telecommunication (SWIFT) financial networks.
-
Blog
Tanium Comply simplifies endpoint security configuration compliance
Tanium, an endpoint security and systems management provider, recently launched its latest Tanium product module, Tanium Comply, intended to transform the lengthy and unreliable work of validating endpoint security configuration into an activity that can be done accurately in minutes, no matter how many endpoints a firm has.
-
Article
Fending off executive impersonation schemes
Everybody thinks they would never fall for an obvious cyber-scam … until they do. Jaclyn Jaeger reports.
-
Blog
HPE, Iron Mountain form alliance
Hewlett Packard Enterprise has formed a strategic collaboration with Iron Mountain, a storage and information management services firm, to help organizations automate the application and execution of legal policy against their content and information repositories.
-
Blog
There simply are not enough cyber-security specialists
Companies need to get much more aggressive when it comes to recruiting the right talent to head their cyber-security efforts, writes John Reed Stark.
-
Article
How data analytics is changing the face of compliance
Compliance and risk officers are increasingly using data analytics to prevent and detect bribery and corruption risk, as well as enjoy cost and operational efficiencies. Jaclyn Jaeger explores.
-
Article
Amid corruption scandals, compliance booms in Brazil
It might seem that corruption scandals are one of Brazil’s leading exports this year, but amid renewed government anti-bribery enforcement efforts, the country’s compliance sector is growing by leaps and bounds. Rodrigo Amaral has more.
-
Blog
Business associate to pay $650K for HIPAA violation
The Department of Health and Human Services reached its first-ever enforcement action with a “business associate” of a HIPAA-covered entity. Compliance officers in the healthcare industry looking to minimize risk of future HIPAA violations will want to take a look at the resulting corrective action plan for lessons learned. Jaclyn ...
-
Article
This is not a game: Scenario planning can help protect your organization’s reputation
With some 4,000 cyber-attacks occurring every day, compliance officers are looking for any solution to help protect their organization from cyber-risk. A method worth considering is wargaming: a simulation that provides a live example of what a cyber-attack might look like and illustrates what can be to better protect the ...