Reducing misconfigurations, monitoring malicious activity, and preventing unauthorized access are foundational activities necessary to ensure security and compliance of applications and data in the cloud. As criminals become more sophisticated in their abilities to exploit cloud misconfiguration vulnerabilities,...
The California Consumer Privacy Act (CCPA) is intended to provide
Californian citizens with the right to know when their personal data is being collected,
whether their personal data is being disclosed or sold, and to whom.
This paper outlines data security solutions that can help your organization meet data...
This guide is for CISOs who want to understand whether their
companies are impacted by the new regulation, how it impacts them,
and what steps their teams can take to comply with GDPR data
security requirements. You'll learn:
The basic framework, intent, and extent of the GDPR
Which companies are affected
To help ensure security as India moves to digital payments, enterprises need to educate their customers to help them understand potential risks and take the right precautions, says payments expert Navin Surya.
The latest edition of the ISMG Security Report analyzes the hacking of Dave, a mobile banking app. Plus: Sizing up the impact of GDPR after two years of enforcement and an assessment of IIoT vulnerabilities.
In this new era, every enterprise is suddenly "cloud first." But there are significant data security gaps to avoid before putting critical data in the cloud. Imperva's Terry Ray shares strategies to maximize simplicity and regulatory compliance.
Now more than ever we continue to hear about cloud security lapses and high-profile breaches in the news. However, if you dig deeper into the details behind each of these breaches, you'd find that many vulnerabilities could have been avoided if the cloud environment was configured according to cloud security best...
Privileged access management is more critical as a result of the shift to telework during the COVID-19 pandemic and the ongoing movement of applications and data to the cloud, says Dr. Yask Sharma, CISO of a large national critical infrastructure organization in India, who outlines essential PAM components.
It is a lot for IT teams to handle a remote workforce. Keeping up with security issues, maintaining data compliance, and minimizing data loss are some of the challenges IT teams are facing today.
In this webinar, we will cover how IT and security teams can empower end-users working remotely by increasing their...
Amidst the COVID-19 pandemic, California's attorney general on March 11 released a second modification of the proposed regulations to implement the California Consumer Protection Act. Attorney Sadia Mirza explains what's included in this "spring cleaning."
Compliance has long been a fact of life for IT and security teams. Compliance regulations originated as efforts to ensure data security and have since mushroomed into constantly changing and overwhelming challenges that consume disproportionate amounts of an organization's resources.
In this whitepaper, you'll...
The Reserve Bank of India's plans to create a self-regulatory organization by April to help oversee the digital payments system could help reduce the complexity of RBI's efforts to help ensure payments security, some security experts say.
One of biggest challenges of complying with Thailand's Personal Data Protection Act, which will go into effect in May, is managing the consent of customers, says Surachai Chatchalermpun, CISO with Krung Thai Bank, the nation's largest state bank.
The cybersecurity outlook for 2020 and the new decade will be characterized by more advanced, targeted and coordinated attack vectors designed to exploit the cybersecurity skills shortage, along with congenitally poor security fundamentals and hygiene.