8 Common Data Governance Challenges & Issues Faced By Businesses

Governance issues with data regulation, access and management can be tackled with clear policies enforced by a dedicated data steward across the organization. Continue reading 8 Common Data Governance Challenges & Issues Faced By Businesses

An Overview of IBM Data Governance Solutions

IBM offers a comprehensive suite of governance solutions that cover automation, policy management, GRC and more. See if any of these tools will benefit your company’s governance strategy. Continue reading An Overview of IBM Data Governance Solutions

When Do You ‘Exceed’ Your Authorization to Use Computer Data?

The law is murky on what constitutes legal authorization and use of computer data In Greek mythology, Cassandra was cursed with the ability to know the future, and with the inability to effectively warn anyone about it. Her warnings about the origins … Continue reading When Do You ‘Exceed’ Your Authorization to Use Computer Data?

Is a Ransomware Attack a Reportable Data Breach?

One question that vexes security engineers, incident responders and lawyers is whether a ransomware attack constitutes a reportable data breach under any of the various data breach disclosure laws, regulations or other requirements. As with anything e… Continue reading Is a Ransomware Attack a Reportable Data Breach?

The Importance of Implementing an Information Security Policy That Everyone Understands

Information security (IS) and/or cybersecurity (cyber) are more than just technical terms. They’re the processes, practices and policy that involve people, services, hardware, and data. In particular, IS covers how people approach situations and … Continue reading The Importance of Implementing an Information Security Policy That Everyone Understands

Access Governance Helps Ensure Network Security Compliance

Protecting your company’s priceless data means making sure of two things: that the right people have access to the correct files and applications, and that the wrong people don’t have access to anything they shouldn’t. This practice is called access g… Continue reading Access Governance Helps Ensure Network Security Compliance

Understanding Single Sign On as a Means of Identity Access Management

I usually spend my mornings doing some reading and enjoying my coffee. On this one particular morning, I noticed that I had received an email from a gaming company I had created an account with around 10 years ago for my kids. They had sent me a code t… Continue reading Understanding Single Sign On as a Means of Identity Access Management

Best of 2019: Privacy Regs Changing the Face of Cybersecurity

As we close out 2019, we at Security Boulevard wanted to highlight the five most popular articles of the year. Following is the second in our weeklong series of the Best of 2019. Companies must take a different cybersecurity tack to ensure ongoing com… Continue reading Best of 2019: Privacy Regs Changing the Face of Cybersecurity