The Calm Before the CCPA Storm: Are You Prepared?

 California businesses that collect personal information on California residents are experiencing a calm before the CCPA regulatory storm. This is a brief period of tranquility, foreshadowed by hefty fines, brand erosion and potential loss of business… Continue reading The Calm Before the CCPA Storm: Are You Prepared?

It Ain’t What You Do (It?s The Way That You Do It)

Contributor Neira Jones explains why managing regulatory compliance can be a lot like mitigating cybersecurity risk.
The post It Ain’t What You Do (It?s The Way That You Do It) appeared first on Security Boulevard.
Continue reading It Ain’t What You Do (It?s The Way That You Do It)

Cybersecurity Maturity Model Certification (CMMC) and Why You Should Care

The U.S. Department of Defense released the first version of the Cybersecurity Maturity Model Certification (CMMC) back on January 31, 2020. Since that time, there has been a flurry of different industry experts working towards helping clients understa… Continue reading Cybersecurity Maturity Model Certification (CMMC) and Why You Should Care

Data Breach Notification Myths Busted

With the advent (and multiplication!) of privacy regulations around the world at both national and sub-national levels, it can be hard to know what your obligations and responsibilities are under these laws. These various frameworks are driven by … Continue reading Data Breach Notification Myths Busted

What Is the EU Cybersecurity Act and What Does It Mean for US-Based Businesses?

During the previous weeks, we provided a thorough overview of the EU NIS Directive, focusing on the Operators of Essential Systems (OES), the Digital Service Providers (DSP) and the compliance frameworks. Our review of the EU cybersecurity policy and s… Continue reading What Is the EU Cybersecurity Act and What Does It Mean for US-Based Businesses?

Future-Proofing Data With a Data Encryption Plan

Data volume storage needs are growing exponentially across hybrid multicloud environments. Meanwhile, companies are being faced with a greater number of regulations to follow, as well as increased exposure to data ransomware, theft and misuse. Many regulations, such as the General Data Protection Regulation, highlight encryption as an example of appropriate technical and organizational measures. While not […]

The post Future-Proofing Data With a Data Encryption Plan appeared first on Security Intelligence.

Continue reading Future-Proofing Data With a Data Encryption Plan

Final Version of NIST SP 1800-23 Guides Identification of Threats to OT Assets

In September 2019, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) announced the release of a draft practice guide entitled, “NIST Special Publication (SP) 1800-23: Energy Secto… Continue reading Final Version of NIST SP 1800-23 Guides Identification of Threats to OT Assets

Preparing for the Risk Challenges of an Uncertain Tomorrow

Here are four risks organizations will likely face in the new normal.
The post Preparing for the Risk Challenges of an Uncertain Tomorrow appeared first on Security Boulevard.
Continue reading Preparing for the Risk Challenges of an Uncertain Tomorrow

A Look at Trump’s Executive Order to Secure the Bulk Power System

On May 1st President Trump signed an Executive Order on “Securing the United States Bulk-Power System.” The order cites foreign adversaries and their increased creation and usage of vulnerabilities against the grid as the primary drive… Continue reading A Look at Trump’s Executive Order to Secure the Bulk Power System

Best Practices for Scoring Your Environment’s Security Measures

For most practical uses today, a combination of hardening and vulnerability detection is required to secure even the most basic digital environment. In each area it is important to see the progress you’re making in these competencies so that you … Continue reading Best Practices for Scoring Your Environment’s Security Measures