The introduction of the California Consumer Privacy Act (CCPA) in 2018 was a turning point for US state privacy laws. As more states introduce privacy laws, organizations must be aware of, and be able to manage, the varying provisions which can make cross-state compliance a complex undertaking.
Download this eBook...
As the US privacy landscape becomes more complex, understanding it becomes crucial. The US privacy landscape has expanded significantly over the past year and currently, 5 states have laws that will be going into effect in 2023.
Download this comprehensive guide to assess the current and upcoming policies:
...
From 2018 to 2020, the number of insider threat incidents increased by a staggering 47%. Security and risk management leaders must evaluate and strengthen their insider risk program, including surveillance of high-risk workers and anomaly monitoring of critical applications and data.
This report provides a deeper...
The world of work has changed. For businesses. For leaders. For employees. Remote jobs now make up more than 15% of the total opportunities in the U.S. and as we look to the future, one fact becomes clear: remote work is here to stay.
Companies have shifted their strategies to allow for long-term remote or hybrid...
From SolarWinds to Kaseya, Accellion, Log4j and Okta, third-party security breaches are among the most devastating for organizations affected. Tony Morbin of ISMG dives into the story behind the results of a global survey with Demi Ben-Ari, the co-founder, CTO and head of security at Panorays.
From SolarWinds to Kaseya, Accellion, Log4j,
or Okta, third-party security breaches are
among the most devastating for organizations
affected.
Defense against third-party risk is
a top-tier risk register item, and it is not a one-off either – you need
continuous monitoring to evaluate the security stance of...
Thanks to continued news about breaches and the rise of ransomware, enterprises are focused - often myopically - on protecting their external footprint. But this means internal threats are more likely to be overlooked, and that creates soft spots that attract bad actors. Due to extensive research that ranges from...
Around the globe, consumers are demanding greater accountability from the companies and the services that they interact with, including how these organizations use and protect their private, personal data.
To end, many governments have spearheaded legislation to protect the Personally Identifiable Information (PII)...
They’re necessary contributors to the business ecosystem, but there’s risk associated with third-party remote access, including bad actors lurking around every access point.
Cybersecurity doesn’t have competitors, it has adversaries. They react to every defense we put in place and seek new ways to achieve their aims - whether they be cybercrime, espionage, or hacktivism. The attackers are innovative, and they share new ways to exploit any vulnerability, so defenders need to share...
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.
It's not the emerging technology or the increasingly complex threat landscape. Instead, people and process are what prove to be consistently the most challenging parts of the job for Caleb Sima, chief security officer at Robinhood.
66% of organizations reported a serious cyber incident in 2021. Were you one of them? Learn how you can quickly prevent security gaps and why legacy VPNs fall short in today’s hybrid workplace with the definitive WFH Security Checklist.
Get the checklist and discover:
How to Provide Secure Remote Access to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.