Compliance

New SEC Cybersecurity Rules Could Affect Private Companies Too

For years, the U.S. Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the...

15 Top Cybersecurity Certifications

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training a...

Encryption: How It Works, Types, and the Quantum Future

Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats. While cryptology is thousand...

Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges

The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending surge has brought with it a co...

Top Data Loss Prevention (DLP) Solutions

In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool. Every organization has data, and some of that da...

Data Deletion Methods: What’s Best for Sensitive Data?

Users may believe that when they delete a file on their hard drive, the document no longer exists. However, IT professionals understand that the data itself may remain. Yet even experienced IT prof...

Three Ways to Protect Unfixable Security Risks

How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack w...

How to Comply with GDPR, PIPL and CCPA

Compliance issues can be tricky, especially when there are so many data privacy laws. Find out how to comply with GDPR, PIPL, and CCPA.

China’s Data Privacy Law Poses Challenge for International Companies

Businesses that have spent the past three-plus years adapting to the European Union’s far-reaching data privacy law now have to decide how they will respond to a similar law in China that has been cri...

Top IT Asset Management (ITAM) Tools for Security

IT asset management (ITAM) used to be purely about inventorying what hardware and software assets were scattered about the enterprise. However, the needs of cybersecurity now require that they also of...

Latest articles