Please turn on your JavaScript for this page to function normally.
Tackling the growing web of data residency and privacy regulations

With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …

HIPAA security compliance: How risk tolerant are you?

At the heart of HIPAA lies a set of core security tenets for which every affected organization is responsible. These fundamentals are absolutely non-negotiable – but the …

Free webinar: What’s new in ISO 27001 2013 revision

Register for this webinar to learn: Main changes in ISO 27001 2013 revision Required documents for the new ISO 27001 How the transition works with certification bodies 12 …

Improving your readiness for OCR audits

In the wake of healthcare data breaches, OCR audits for HIPAA compliance have become more common – and the consequences have been more highly publicized. But many …

If anything shouldn’t be taken for granted, it’s Information Security Management

It was one of our usual off-the-record discussions when I spoke with network admin and asked about the regular password change set up on the system. And, the answer included …

Preparing for an information audit

A constant concern of many organizations is how to improve security or ensure that they meet audit needs. Though this is a top concern, they assume that any type of solution …

ISO 27001: An overview of ISMS implementation process

Register for this webinar to learn: Family of ISO 27k standards – for what purpose should each standard be used 17 steps towards ISO 27001 certification Key benefits and …

ITIL and ISO 20000 problem management

Remember this situation? You’re running Windows. The blue screen forces you to reboot your PC. And then it happens again. Incident Management = reboot your PC. And your …

How to become an ISO 27001 / ISO 22301 consultant

If you are thinking about a career change, becoming an independent consultant for ISO 27001 and/or ISO 22301 certainly sounds like an attractive option. But what do you need …

8 criteria to decide which ISO 27001 policies and procedures to write

If you’re just starting to implement ISO 27001 in your company, you’re probably in a dilemma as to how many documents you need to have, and whether to write …

When to use tools for ISO 27001/ISO 22301 and when to avoid them

If you’re starting to implement complex standards like ISO 27001 or ISO 22301, you’re probably looking for a way to make your job easier. Who wouldn’t? After …

The security threat of unsanctioned file sharing

Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies …

Don't miss

Cybersecurity news