Accelerating SaaS security certifications to maximize market access

Accelerating SaaS security certifications to maximize market access

The regulatory landscape for Software-as-a-Service (SaaS) offerings is rapidly changing worldwide as governments seek to address concerns around privacy, security, and data sovereignty. While the European Union’s Cybersecurity Certification Scheme for Cloud Services (EUCS) has set a high standard for data protection, Asian countries are also stepping up their regulatory frameworks. For instance, the Information System Security Management and Assessment Program (ISMAP) in Japan provides a baseline standard of protection for user data, imposing stringent…

Read More

Navigate the new European AI Act and possible global standardization

Navigate the new European AI Act and possible global standardization

No doubt, the European Union’s (EU) recently approved, comprehensive regulation act on artificial intelligence (AI) is an important milestone in the global effort to establish responsible AI governance. This landmark legislation establishes a robust legal structure, setting stringent standards for AI development and usage within the EU, with the aim of nurturing a climate where businesses and investors can innovate with confidence, knowing their AI systems must adhere to principles of safety, transparency, equity and…

Read More

Proposed rules may lead to increased compliance requirements ahead

Proposed rules may lead to increased compliance requirements ahead

On January 29, 2024, the U.S. Department of Commerce’s (DOC) Bureau of Industry and Security (BIS) issued a proposed rule seeking to secure U.S. Infrastructure as a Service (IaaS) products against foreign parties seeking to use such products to engage in malicious cyber-enabled activity. Specifically, the proposed rule would impose certain due diligence and reporting requirements on U.S. IaaS providers and their foreign resellers. The Notice of Proposed Rule Making (NPRM) follows Executive Order 13984…

Read More

Privacy is a Key Enabler of Trust

Privacy is a Key Enabler of Trust

How important is privacy in building and maintaining trust with customers? While more than 160 countries have omnibus privacy laws today, business leaders recognize that privacy is more than a compliance exercise – it has become a business imperative that is inextricably tied to customer trust.  As part of Cisco’s recognition of Data Privacy Day on January 28, today we released the Cisco 2024 Data Privacy Benchmark Study, our seventh annual review of key privacy issues…

Read More

Pervasive Ransomware Visibility on Existing Infrastructure: How Cisco Secure Network Analytics Helps

Pervasive Ransomware Visibility on Existing Infrastructure: How Cisco Secure Network Analytics Helps

Cyber security attacks in 2023 reached a new level of sophistication as significant supply chain attacks and evolved malware tools have accelerated the risk facing financial institutions. With insider threat and supply chain risk presenting the weakest link in the chain, the threat facing financials is no longer if, but how they will be breached. And more importantly, how they can detect, contain, and defend against breaches as they occur. Tool sprawl has created an…

Read More

To overcome compliance challenges, financial institutions must look beyond ZTNA

To overcome compliance challenges, financial institutions must look beyond ZTNA

To overcome compliance challenges, financial institutions must look beyond ZTNA | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Consider the human factor in cyber breaches

Consider the human factor in cyber breaches

Consider the human factor in cyber breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

A manifesto for cloud data security

A manifesto for cloud data security

A manifesto for cloud data security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Managing cyber risks while company scales

Managing cyber risks while company scales

Managing cyber risks while company scales | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Compliance and security are two sides of the same coin

Compliance and security are two sides of the same coin

Compliance and security are two sides of the same coin | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2 3 4 5 17