Busting compliance myths
In this interview for Help Net Security, Troy Fine, Senior Manager of Cybersecurity Risk Management at Drata, talks about the challenges of data compliance and what companies must do to achieve it. Compliance has been an important factor for all busi.....»»
Apple @ Work: Ivanti patches a critical bug in Ivanti Endpoint Manager that would allow for device takeover
Apple @ Work is brought to you by Kolide, the device trust solution that ensures that if a device isn’t secure, it can’t access your cloud apps. If you have Okta, Kolide can help you get your fleet to 100% compliance. They’re Zero Trust.....»»
Epic to contest Apple’s ‘bad-faith’ compliance plan following Supreme Court ruling on App Store
After a long legal dispute, the US Supreme Court ruled today that Apple will have to relax some of its App Store policies. More specifically, the company now has to let developers offer alternative payment methods. Still, Epic Games CEO Tim Sweeney i.....»»
Vanta appoints Jadee Hanson as CISO
Vanta announced that it has appointed Jadee Hanson as its CISO, overseeing Security, Enterprise Engineering, Privacy and Governance, Risk and Compliance (GRC), reporting directly to Vanta’s CEO Christina Cacioppo. Hanson is the latest executive to.....»»
Apple @ Work: Kandji now allows Apple IT admins to configure iOS and iPadOS home screens remotely
Apple @ Work is brought to you by Kolide, the device trust solution that ensures that if a device isn’t secure, it can’t access your cloud apps. If you have Okta, Kolide can help you get your fleet to 100% compliance. They’re Zero Trust.....»»
Viavi enhances Observer Platform to maximize network availability, productivity and compliance
Viavi Solutions announced significant enhancements to the Observer Platform allowing IT teams to further maximize network availability, productivity and compliance. The enhancements include critical new capabilities in End-User Experience (EUE) scori.....»»
Proton offers dealers online security as hacking threat grows
Reynolds and Reynolds acquired Proton last year, in the wake of growing cybersecurity needs and compliance requirements......»»
Legal, compliance and privacy leaders anxious about rapid GenAI adoption
Rapid GenAI adoption is the top-ranked issue for the next two years for legal, compliance and privacy leaders, according to Gartner. 70% of respondents reported rapid GenAI adoption as a top concern for them. “Increases in capability and usability.....»»
Binance to pay $2.7 billion fine after hiding shady transactions from feds
Binance’s former compliance-control officer must also pay a $1.5 million fine. Enlarge / Founder and CEO of Binance Changpeng Zhao, commonly known as "CZ," in May 10, 2022, in Rome, Italy. (credit: Antonio Masiello / Contribut.....»»
UAW"s Fain travels to Tennessee to pressure VW management on organizing drive
Volkswagen said it denied "any claims of union-busting, intimidation or illegal violations of worker rights.".....»»
VOCOlinc Smart LED Desk Lamp review: full of features without busting your budget
The VOCOlinc Smart LED Desk Lamp lets you control its color temperature and brightness level through HomeKit at a reasonable price that won't hurt your wallet.VOCOlinc Smart LED Desk Lamp review: Lamp stationedVOCOlinc offers various smart products t.....»»
Transcend enhances its privacy platform to address current and future compliance challenges
Transcend announced an expansion of its product suite—going even further to help the world’s best brands manage complex privacy compliance challenges. Powering privacy for Fortune 100 companies, the global 2000s, and high-growth start-ups, Transc.....»»
Three ways sustainable businesses can prepare for climate challenges
From supply chain disruption to regulatory compliance pressure, companies experience bottom-line impacts of climate change every day. Accounting for environmental disruptions and transitions is essential to corporate risk management and resilience pl.....»»
SAFE Materiality Assessment Module identifies top cyber risk scenarios
Safe Security announced its new SAFE Materiality Assessment Module, enabling security and risk leaders to achieve SEC compliance by estimating and tracking materiality of cyber incidents. Safe Security’s materiality module is based on the fully.....»»
ThreatNG open-source datasets aim to improve cybersecurity practices
The ThreatNG Governance and Compliance Dataset is an open-source initiative that aims to democratize access to critical data, fostering transparency, collaboration, and improvement of cybersecurity practices globally. Datasets for organizational insi.....»»
Shifting data protection regulations show why businesses must put privacy at their core
Like it or not, data protection will be one of the biggest issues organizations face in 2024. Knowing where to focus compliance efforts will be tricky, with more and more state-level privacy laws becoming effective in the US, creating a patchwork of.....»»
Are wetlands really a flood risk? Experts debunk most common myths around these precious ecosystems
Back in 2020, a grim picture of nature in the European Union emerged......»»
Aim for a modern data security approach
Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Many organizations no lo.....»»
Navigating regulatory compliance during data disclosure
Ajay Bhatia at Veritas Technologies discusses how businesses can balance transparency with data compliance......»»
Ex-Twitter exec sues Musk, says he was fired for objecting to budget cuts
Fired exec suing Musk says he warned that budget cuts would harm FTC compliance. Enlarge (credit: Getty Images | NurPhoto ) A former Twitter security executive sued Elon Musk and X Corp. yesterday, alleging that he was u.....»»
CellTrust SL2 Moderator AI prevents data leakage and blocks risky mobile messages
CellTrust introduces SL2 Moderator AI for financial advisors and compliance officers to stop data leakage and block risky mobile messages before they are sent to clients. “It is no longer enough to just capture and provide data to compliance depart.....»»