searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

regulation

Get our top stories in your inbox

Top compliance and risk management challenges for financial organizations

December 6, 2019

Notable regulatory compliance and risk challenges remain high in a number of key areas for U.S. banks and credit unions, according to the results of a Wolters Kluwer survey. …

Exploring the proper use of pseudonymisation related to personal data

December 6, 2019

In the light of the General Data Protection Regulation (GDPR), the challenge of proper application of pseudonymisation to personal data is gradually becoming a highly debated …

The rise of continuous crowdsourced security testing for compliance

December 5, 2019

A large percentage of organizations and institutions are moving toward a rigorous, continuous testing model to ensure compliance, a Synack report reveals. As part of this …

Despite potential fines, GDPR compliance rate remains low

December 4, 2019

58% of surveyed businesses worldwide failed to address requests made from individuals seeking to obtain a copy of their personal data as required by GDPR within the one-month …

Cybersecurity regulation is not one-size-fits-all

December 4, 2019

Differences in cultural values have led some countries to tackle the spectre of cyberattacks with increased internet regulation, whilst others have taken a …

2019 experienced massive spate of crypto crimes, $4.4 billion to date

December 2, 2019

With only seven months left for nations to pass laws and virtual asset service providers (VASPs) to comply with the guidelines, the majority of cryptocurrency exchanges are …

Most businesses have yet to allocate a CCPA compliance budget

November 27, 2019

Only 15% of organizations report having a mature approach to data privacy, 59% have yet to allocate budget to CCPA compliance, and 58% are currently using or will look to …

Port cybersecurity: Safeguarding operations against cyber attacks

November 27, 2019

Port stakeholders are facing more and more cybersecurity challenges with the emergence of new threats, regulations and increased digitalization. Major incidents such as …

Growing complexity is driving operational changes to privacy programs

November 25, 2019

A majority of companies are adopting a single global data protection strategy to manage evolving privacy programs, and that managing the expanding ecosystem of third parties …

California IoT security law: What it means and why it matters

November 20, 2019

In September, California Governor Jerry Brown signed into law a new bill aimed at regulating the security of IoT devices, and it’s set to go into effect in a few short months …

Top concerns for audit executives? Cyber risks and data governance

November 12, 2019

As organizations continue to collect customer and employee data, chief audit executives (CAEs) are increasingly concerned about how to govern and protect it. Gartner conducted …

What financial records do companies need to keep, and for how long?

November 8, 2019

Companies generate stacks of documents and managing them correctly is crucial. It can be complicated to balance organizational requirements, employee interests, and legal …

Posts navigation

1 … 3 4 5 6 7 8 9 10 11 … 14
bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

  • Preparing for the Cybersecurity Maturity Model Certification onslaught
  • Protecting the digital workplace with an integrated security strategy
Free certification Exam Action Plan from (ISC)²

What's new

linux tux

Now-fixed Linux kernel vulnerabilities enabled local privilege escalation (CVE-2021-26708)

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

work from home

Enterprises observing uptick in risky behaviors since shift to remote work

Don't miss

Microsoft Exchange

Exchange Servers targeted via zero-day exploits, have yours been hit?

bot

Proliferation of sneakerbots across industries: The long tail of DIY bot operators

10 CISO strategies

10 strategies small security teams can use for effective cybersecurity management

puzzle

Preparing for the Cybersecurity Maturity Model Certification onslaught

malware

Multi-payload Gootloader platform stealthily delivers malware and ransomware

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?
  • Tips for boosting the “Sec” part of DevSecOps

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise