Security News
A-LIGN released its 2022 Compliance Benchmark Report, highlighting the concern over increased threat of ransomware attacks and the need for organizations to adopt a more streamlined approach to their compliance requirements. "This year's Benchmark Report brings the organizational compliance mandate into sharp focus," notes Patrick Sullivan, author of the report and VP of Customer Success at A-LIGN. "C-suite executives are placing more and more importance on the value of compliance programs to drive a growth mindset in their organizations as well as a culture of security best practices. By streamlining compliance, companies have more cycles to focus on core security issues along with a tighter handle on the critical security controls necessary to prevent ransomware and implement zero trust."
As the number of regulations grow each day, and are different depending on the sector, the consequence of not adhering to them has come more and more severe. It can massively damage an...
Security, employee compliance biggest challenges when supporting remote workers. For its report "The State of Remote Work 2022: A Survey of End-User Computing Decision Makers," Workspot commissioned market research firm Dimensional Research to survey 304 IT professionals about their remote workforce.
An ISO 27001 certification can be thought of as evidence that an organization takes cyber security seriously and secures its information systems according to industry best practices. While there is no rule requiring organizations to become ISO 27001 certified, there are three main reasons why an organization might choose to become ISO 27001 certified.
Security and compliance rank as the top challenges for deploying cloud-native apps. Tigera's State of Cloud-Native Security report is based on a survey of 304 security and IT professionals from around the world.
As of March 31, 2022, the findings uncovered that 90% of companies are not fully compliant with CCPA and CPRA Data Subject Access Request requirements. Further, 95% of companies are using error prone and time consuming manual processes for GDPR DSAR requirements.
There are several factors contributing to compliance leader burnout but below are the top three to recognize, along with ways that companies and their compliance talent can effectively address these moving forward. If traditional methods of compliance are used, the compliance leader has no actual oversight on whether those controls are running.
In this video, Craig Lurey, CTO and Co-Founder of Keeper Security, talks about the new secure add-on to the Keeper enterprise platform, called Compliance Reports. Keeper Compliance Reports allow Keeper Administrators to monitor and report the access permissions of privileged accounts across the entire organization, in a zero-trust and zero-knowledge security environment.
Transcend released the results of its latest survey of technology decision makers, which assessed their readiness for Apple's in-app deletion requirements for iOS apps that offer account creation. Less than a quarter of respondents understand the full scope of Apple's in-app deletion requirements, despite clarifications from Apple.
Another reason to start with the CIS Controls? They work. Want to track your implementation of the Controls and your compliance with those mapped frameworks? The CIS Controls Self Assessment Tool, available exclusively to CIS SecureSuite Members, can help with that.