Compliance & Privacy

Security gap analysis: Four-step guide to find and fix vulnerabilities

A gap analysis may be a common assessment, but it must be carried out correctly to realize the full benefits.…

1 month ago

New Mexico sues Google for violating privacy of minors

New Mexico is suing Google for alleged privacy violations against minors, specifically that it uses its Google Education program to…

1 month ago

CCPA and GDPR: Similarities and differences you must know

The GDPR and the CCPA are both aimed at protecting privacy. Although many similarities exist between the two, there are…

2 months ago

Binding corporate rules and GDPR: A data transfer and protection solution

To comply with GDPR, many companies have adopted binding corporate rules (BCRs) as a solution for transferring personal data—and its…

2 months ago

California Consumer Privacy Act starts Jan. 1 — Are you ready?

Ready for a New Year’s hangover? If you’re a large business that’s not ready for the California Consumer Privacy Act,…

3 months ago

The four most internationally significant recent privacy laws

GDPR has been covered endlessly, but it is only one of several recent privacy laws changing the handling of confidential…

4 months ago

Facebook patches WhatsApp remote code execution vulnerability

Facebook found and patched a vulnerability in its WhatsApp service. While Facebook says no users were compromised, the event is…

5 months ago

ISO 27001 certification: Your step-by-step guide

ISO 27001 certification demonstrates that your business is serious about security. Here’s a roadmap to getting certified — and why…

5 months ago

COBIT 2019: An effective governance framework for IT pros

Every business with IT as part of its foundation needs a comprehensive governance strategy. This is where COBIT 2019 comes…

6 months ago

HIPAA IT compliance: Privacy and security rules you must know

HIPAA is the mandatory health regulation that must be followed strictly. But if you’re an IT pro in the health-care…

6 months ago