New & Notable
Security audit, compliance and standards News
June 26, 2020
Businesses can choose from a growing number of mobile apps and Wi-Fi software to protect workers from COVID-19. But tech won't succeed without top-of-the-line privacy protection.
April 09, 2020
This week's Risk & Repeat podcast looks at the backlash against Zoom over security and privacy concerns and asks whether there's been an overreaction.
April 02, 2020
This week's Risk & Repeat podcast looks at several security issues Zoom faced over the last week, which led to questions about the company's privacy and security practices.
February 25, 2020
Securiti.ai, which offers an AI-powered 'PrivacyOps' platform, took home the title of 'Most Innovative Startup' at RSA Conference's Innovation Sandbox Contest.
Security audit, compliance and standards Get Started
Bring yourself up to speed with our introductory content
The Cybersecurity Maturity Model Certification requires DOD contractors to achieve baseline security standards. Explore the five levels of certification and how to achieve them. Continue Reading
Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents. Continue Reading
The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal ... Continue Reading
Evaluate Security audit, compliance and standards Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security must be part of IT from the start and then continue through the entire product lifecycle -- design, build, release and maintenance. Consumers now demand it. Continue Reading
Implementing privacy-preserving machine learning controls, such as federated learning and homomorphic encryption, can address top cloud security and privacy concerns. Learn how. Continue Reading
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
Manage Security audit, compliance and standards
Learn to apply best practices and optimize your operations.
Video conferencing tools are a remote worker's lifeline. As such, it is essential to maintain their security. These eight best practices will help ensure secure, private video-enabled meetings. Continue Reading
Now that the CCPA is in full effect, businesses must adjust their processes to better protect content. Organizations should prioritize security to avoid fines. Continue Reading
Data sovereignty regulations combined with a tsunami of data growth and increased cloud usage have created a perfect storm for enterprises. Follow these steps to ensure compliance. Continue Reading
Problem Solve Security audit, compliance and standards Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When trying to maintain balance between security and privacy in an AI-enabled world, who decides which side should tip and when? So continues the security vs. privacy debate. Continue Reading
With each IoT standards body creating its own architecture or framework, IT professionals have many options to sort through for any IoT deployment. Continue Reading
Putting together a HIPAA compliance program can be fraught with difficulty. Review best practices and a HIPAA compliance checklist to avoid common pitfalls and pass an audit. Continue Reading