compliance

The future of vulnerability management and patch compliance
IT departments continue to face immense pressure to get vulnerability and patch management right as threat actors use new and old methods to exploit network endpoints. But are …

EU cyber resilience regulation could translate into millions in fines
The EU Commission’s Cyber Resilience Act (CRA) is intended to close the digital fragmentation problem surrounding devices and systems with network connections – from …

As legislation evolves, businesses need a firm understanding of secure payment options
Despite the constant evolution of the financial landscape, consumers are still prioritizing a seamless and safe payment journey above all else, according to PCI Pal. New …

Privacy concerns are limiting data usage abilities
Access to data is significantly limited by data privacy and protection regulations, according to a survey conducted by Bloor Research. The report reveals that 60% of the data …

PCI Secure Software Standard 1.2 released
PCI Security Standards Council (PCI SSC) published version 1.2 of the PCI Secure Software Standard and its supporting program documentation. The PCI Secure Software Standard …

Why automation is critical for scaling security and compliance
As companies are modernizing their tech stacks, many are unwittingly putting their business and customers at risk. Why? Because technology moves faster than teams can keep …

How compliance leaders can encourage employees to report misconduct
As Chief Compliance Officers (CCOs) continue to face challenges in restoring employee misconduct reporting to pre-pandemic levels, there are three strategies they should …

7 reasons why you must embed trust into the core of your business
As organizational trust becomes a top priority for companies of all sizes and industries, a new OneTrust report highlights seven key industry trends relevant to privacy, …

Cybersecurity engineering under the Federal Trade Commission
When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. …

Federal defense contractors are not properly securing military secrets
Defense contractors hold information that’s vital to national security and will soon be required to meet Cybersecurity Maturity Model Certification (CMMC) compliance to …

90% of organizations have Microsoft 365 security gaps
A recently published study evaluated 1.6 million Microsoft 365 users across three continents, finding that 90% of organizations had gaps in essential security protections. …

Compliance initiatives can advance your organization’s security journey
Compliance standards are designed to give organizations a foundational approach to designing their security program while also reassuring third parties that you have met at …
Featured news
Resources
Don't miss
- AWS CISO explains how cloud-native security scales with your business
- Product showcase: Apricorn Aegis NVX, a high-security, portable SSD
- How to build and grow a scalable vCISO practice as an MSP
- Global OT cyber risk could top $329 billion, new report warns
- Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543)