informa

Compliance

Breaking news, news analysis, and expert commentary on cybersecurity risk, and the tools, technologies, and practices for assessing risk.

DORA's Global Reach and Why Enterprises Need to Prepare
The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.
March 04, 2022
The new EU regulation is a response to the rise of ransomware attacks and other new cyberthreats that have proliferated in the wake of the global pandemic.
by Ilias Chantzos, Global Privacy Officer and Head of EMEA Government Affairs, Broadcom
March 04, 2022
5 min read
Article
Microsoft Debuts Unified Service for Multicloud ID Management
With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.
February 23, 2022
With nine in 10 companies adopting a multicloud strategy, service providers are focused on finding ways to support the management and security efforts of businesses that rely on multiple cloud resources.
by Robert Lemos, Contributing Writer
February 23, 2022
4 min read
Article
Preparing for the Next Cybersecurity Epidemic: Deepfakes
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
January 19, 2022
Using blockchain, multifactor authentication, or signatures can help boost authentication security and reduce fraud.
by Elaine Lee, Principal Data Scientist, Cybergraph team, Mimecast
January 19, 2022
4 min read
Article
Name That Toon: Nowhere to Hide
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
January 18, 2022
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
by John Klossner, Cartoonist
January 18, 2022
1 min read
Article
Breach Response Shift: More Lawyers, Less Cyber-Insurance Coverage
Companies are more likely to rely on outside attorneys to handle cyber response in order to contain potential lawsuits. Meanwhile, cyber-insurance premiums are rising but covering less.
January 10, 2022
Companies are more likely to rely on outside attorneys to handle cyber response in order to contain potential lawsuits. Meanwhile, cyber-insurance premiums are rising but covering less.
by Robert Lemos, Contributing Writer
January 10, 2022
5 min read
Article
Why Cyber Due Diligence Is Essential to the M&A Process
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
December 29, 2021
That announcement may feel good, but if your prospective acquisition's cybersecurity levels are substandard, it might be best to hold off.
by Jim Crowley, CEO at Industrial Defender
December 29, 2021
5 min read
Article
Is Data Security Worthless if the Data Life Cycle Lacks Clarity?
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
December 17, 2021
If you cannot track, access, or audit data at every stage of the process, then you can't claim your data is secure.
by François Amigorena, Founder & CEO, IS Decisions
December 17, 2021
4 min read
Article
Dear Congress: It's Complicated. Please Consider This When Crafting New Cybersecurity Legislation
As mandatory reporting bills work their way through the halls of Congress, what should businesses do to prepare for this pending legislation?
December 16, 2021
As mandatory reporting bills work their way through the halls of Congress, what should businesses do to prepare for this pending legislation?
by Lyndon Brown, Chief Strategy Officer, Pondurance
December 16, 2021
5 min read
Article
US Banks Will Be Required to Report Cyberattacks Within 36 Hours
There is currently no specific time frame during which banks must report to federal regulators that a security incident had occurred. A new notification rules changes that to 36 hours.
November 19, 2021
There is currently no specific time frame during which banks must report to federal regulators that a security incident had occurred. A new notification rules changes that to 36 hours.
by Dark Reading Staff, Dark Reading
November 19, 2021
3 min read
Article
Emotet Makes a Comeback
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.
November 16, 2021
The popular Trojan has re-emerged on the scene several months after the botnet infrastructure behind it was disrupted by law enforcement.
by Dark Reading Staff, Dark Reading
November 16, 2021
1 min read
Article
4 Tips to Secure the OT Cybersecurity Budget You Require
OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.
November 10, 2021
OT security engineers and personnel should approach senior management with an emphasis on risk reduction benefits and with a concrete plan to secure budget and funding before it's too late.
by Jim Crowley, CEO at Industrial Defender
November 10, 2021
4 min read
Article
Laika Raises $35M Series B to Help Companies Prepare for Security Audits
Laika helps companies establish robust compliance practices to meet the strict requirements from regulators and enterprise customers.
November 02, 2021
Laika helps companies establish robust compliance practices to meet the strict requirements from regulators and enterprise customers.
November 02, 2021
5 min read
Article
SaaS and Third-Party Risk: Is Your Organization Asking the Hard Questions?
An investment in due diligence might prevent your organization from being part of next week's breach news cycle.
November 02, 2021
An investment in due diligence might prevent your organization from being part of next week's breach news cycle.
by Stephanie Benoit-Kurtz, Lead Cybersecurity Faculty, University of Phoenix
November 02, 2021
4 min read
Article
5 Ways CMMC Security Requirements May Impact Universities
The Cybersecurity Maturity Model Certification puts research universities in a position where they must validate the effectiveness of their security controls before applying for a grant or bidding on a government contract.
October 25, 2021
The Cybersecurity Maturity Model Certification puts research universities in a position where they must validate the effectiveness of their security controls before applying for a grant or bidding on a government contract.
by Helen Patton, Advisory CISO, Cisco Secure
October 25, 2021
6 min read
Article
Overly Complex IT Infrastructures Pose Security Risk
Cybersecurity budgets are set to increase in 2022, but companies worry that complex IT networks and data infrastructure are wasting money, new PwC survey finds.
October 11, 2021
Cybersecurity budgets are set to increase in 2022, but companies worry that complex IT networks and data infrastructure are wasting money, new PwC survey finds.
by Robert Lemos, Contributing Writer
October 11, 2021
4 min read
Article