Is SFTP GDPR Compliant? [How to Make SFTP GDPR Compliant]

Need your SFTP protocol to be GDPR compliant? Here are the GDPR requirements your company will need to prove compliance. Is SFTP GDPR Compliant? No, SFTP by itself is not GDPR compliant. Making SFTP compliant requires additional protocols, tests, appli… Continue reading Is SFTP GDPR Compliant? [How to Make SFTP GDPR Compliant]

Overcoming Compliance Issues in Cloud Computing

The benefits of organizations moving some or all their IT workloads to the cloud are well-known and numerous. There are several challenges to successful cloud adoption, though, and one of the most important of them is compliance. Whether your cloud use… Continue reading Overcoming Compliance Issues in Cloud Computing

Dunhammer: NSA Blamed for Danish Spying on Euro Pols

In a damning leaked report, Danish authorities reveal that the NSA spies on friendly foreign governments.
The post Dunhammer: NSA Blamed for Danish Spying on Euro Pols appeared first on Security Boulevard.
Continue reading Dunhammer: NSA Blamed for Danish Spying on Euro Pols

Hi-5 With A CISO Mário Fernandes, Banco BPI

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Mário João Fernandes, born and raised in Mozambique, has been working in the banking sector for 29 years and has been fulfilling dedicated … Continue reading Hi-5 With A CISO Mário Fernandes, Banco BPI

Five worthy reads: Distributed cloud is the future of cloud computing

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Distributed cloud allows organizations to bring cloud computing closer to their location. This week we look at why it’s the … Continue reading Five worthy reads: Distributed cloud is the future of cloud computing

Supreme Court To Decide Scope of Federal Hacking Law

For more than 30 years, the federal computer hacking statute has been used by companies to sue employees (and former employees), competitors and even customers and users who violate their rules on the use of computers, computer databases and data glea… Continue reading Supreme Court To Decide Scope of Federal Hacking Law

5 aspectos principais de rede para conformidade com a HIPAA

O Health Insurance Portability and Accountability Act, também conhecido como HIPAA, é um padrão de conformidade que foi implementado depois que todas as informações relacionadas à saúde foram digitalizadas. O ponto crucial do ato é garantir que todas a… Continue reading 5 aspectos principais de rede para conformidade com a HIPAA

How Biden’s EO Impacts Cybersecurity Players

On May 12, the Biden Administration released an executive order aimed at government agencies, vendors and developers, who all will have to design their products with a greater focus on security. The EO on “Improving the Nation’s Cybersecurity” comes i… Continue reading How Biden’s EO Impacts Cybersecurity Players

Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

Wednesday June 30, 2021 11 AM PST / 2 PM EST NERC has recently partnered with the Department of Energy (DOE) to expand the Cybersecurity Risk Information Sharing Program (CRISP) to include operational technology. The program is aimed at protecting the … Continue reading Upcoming Discussion: A Risk-Based Approach to Bridging the Energy Sector Security Gap

Certificação ISO / IEC 20000: o que é, por que sua organização precisa e como obtê-la

Uma das coisas mais importantes que os clientes consideram ao comprar um produto ou serviço é sua credibilidade. Uma etiqueta que afirma que o produto foi testado, analisado e certificado por um órgão regulador internacional reafirma a decisão de compr… Continue reading Certificação ISO / IEC 20000: o que é, por que sua organização precisa e como obtê-la