CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Compliance
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Compliance

Business partners shaking hands while standing in server room showing compliance, trust and transparency
Cyber SecurityInsights

Trust and Transparency Are Essential Elements of Modern Compliance

December 28, 2022
How do technology partners, cloud providers, vendors, distributors, customers and organizations earn trust? There is no simple answer, but compliance standards play a significant role. There can be no trust without transparency, and modern compliance helps organizations make their security practices considerably less opaque.
Read More
Father using laptop sitting on the sofa at home showing SOC 2 compliance and hybrid work
Cyber SecurityInsights

SOC 2 Compliance and Hybrid Workstyles

August 30, 2022
The COVID pandemic and The Great Resignation have led to extensive upheaval in workforces and workplaces. How best to achieve and maintain continuous SOC 2 compliance in the face of these seismic shifts?
Read More
Man using magnifying glass showing SOC 2 for data protection
Data ProtectionInsights

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

August 15, 2022
Data protection, data privacy, and cyber security are top-of-mind concerns, especially for fast growing startups. But what if you could turn your data protection practices into a competitive advantage that helps you close more deals?
Read More
Data PrivacyInsights

Compliance-First vs Privacy-First: Why Aiming for Compliance Is a Failing Strategy

June 8, 2022
During the privacy-last era, consumer trust in brands was repeatedly broken when brands captured, sold, and abused data without consent - even though it was technically legal. To rebuild trust, brands need to change their strategies to be privacy-first instead of last.
Read More
Check mark on abstract blue background showing compliance to UK SOX
Data ProtectionInsights

Demystifying UK SOX

January 26, 2022
UK SOX is coming and many organizations are feeling worried about exhausting all existing compliance resources, incurring high costs, or the amount of testing and data management required to ensure compliance.
Read More
California State Capitol Building in Sacramento showing compliance with CPRA
Data ProtectionInsights

CPRA: The Next Big Mandate (Is Right Around the Corner)

September 24, 2021
Comprehensive mandates like the California Privacy Rights Act (CPRA) require extensive preparation—those with processes in place before it arrives will manage it best, and perhaps even derive benefits from it.
Read More
Man holding protective hands over gears forming shape of a cloud showing cloud security and compliance
Cyber SecurityInsights

Challenges With Compliance in the Cloud

June 1, 2021
Compliance requirements do not always reflect the complexities of new cloud systems or indicate where problems with traditional security approaches do not work as well for cloud security.
Read More
Man inspecting car showing need for vehicle cybersecurity
Cyber SecurityInsights

The Race for Cybersecurity Regulation Compliance is On

May 12, 2021
New standards are requiring OEMs and Tier-1s to implement cybersecurity solutions that are comprehensive and can operate throughout the lifecycle of the vehicle.
Read More
Military soldier holding laptop showing MSP compliance with CMMC framework
Cyber SecurityInsights

An MSP’s Perspective On the Defence Department’s CMMC Compliance Standards

April 23, 2021
Newly released Cybersecurity Maturity Model Certification (CMMC) framework will require third-party assessment of mandatory practices and requirements to strengthened cybersecurity infrastructure for the DoD and its more than 300,000 contractors.
Read More
Programmer in glasses staring at monitor showing data masking of personal information
Data ProtectionInsights

How Disruption Has Changed the Role of Developers

November 26, 2020
Employing a data protection method such as data masking as soon as production data enters the development cycle ensures that data is secured before it travels downstream or outside the business.
Read More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results