How organizations can save CISOs amidst increasing federal regulations

How organizations can save CISOs amidst increasing federal regulations

In an effort to bolster data security and privacy practices amidst increasing cyberattacks, new data breach reporting rules enforced by the Federal Trade Commission (FTC) and Securities and Exchange Commission (SEC) have taken effect for various organizations and financial institutions. Since May 13, 2024, non-banking financial institutions (including mortgage brokers, payday lenders and tax preparation firms) must report data breaches to the FTC within 30 days of discovery. This new mandate, which is part of…

Read More

Creating a safer workplace: California Senate Bill 553 becomes law

Creating a safer workplace: California Senate Bill 553 becomes law

California’s Senate Bill 553 (SB 553) mandates that nearly all employers in the state establish written workplace violence prevention plans by July 1, 2024. This law amends California’s labor and civil procedure codes, requiring most organizations to create prevention plans and employee training programs. Exceptions are made for employers already covered by healthcare standards and small, non-public businesses with fewer than ten employees. The law will be enforced by Cal/OSHA, though the specifics of enforcement…

Read More

Workplace violence prevention: How to formulate a plan

Workplace violence prevention: How to formulate a plan

Workplace safety remains a critical issue, impacting more than 1 million Americans each year. In response to the challenge that employees face, California enacted S.B. 553 last fall, mandating that employers with more than 10 employees in the state of California develop workplace violence prevention plans, along with other requirements, by July 1, 2024.  Laws like S.B. 553 are essential tools for safeguarding employees that ensure employers meet legal standards, implement preventive measures and foster a…

Read More

6 months of SEC cybersecurity disclosure rules: An updated view

6 months of SEC cybersecurity disclosure rules: An updated view

As we reach the six-month mark of the SEC’s new cybersecurity disclosure regulations going into effect, it seems a good time to reflect on the requirements.  With the average cost of a security breach nearing $4.5 million and the increased frequency and sophistication of attacks showing no signs of letting up, it seems these requirements are necessary; self-regulation proved insufficient, and the stakes are higher than many people in leadership positions recognize. It’s not just…

Read More

With the exponential growth of data, new SEC rules need a new approach

With the exponential growth of data, new SEC rules need a new approach

The latest estimates show 328.77 million terabytes of data are created each day, roughly 120 zettabytes per year, compared to just 2 zettabytes in all of 2010. This growth isn’t expected to slow in the coming years, and organizations increasingly rely on this data to make informed business decisions, conduct research and analysis and much more. But managing and securing that growth in data volume poses a challenge for security teams, leading to more breaches…

Read More

The future of data privacy and compliance (and how to stop it)

The future of data privacy and compliance (and how to stop it)

With 2024 upon us, experts are once again sharing best practices for adapting your business’ data strategy to the times. From ensuring compliance with state-by-state privacy laws to preparing for the inevitable removal of third-party cookies over the course of the year, organizations face ever-increasing pressure to adapt to new realities. Still, mere compliance isn’t enough: the winners will be those who can follow the rules without sacrificing their ability to glean valuable insights or…

Read More

To overcome compliance challenges, financial institutions must look beyond ZTNA

To overcome compliance challenges, financial institutions must look beyond ZTNA

To overcome compliance challenges, financial institutions must look beyond ZTNA | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

4 ways MDM solutions can help IT stay ahead of regulatory compliance

4 ways MDM solutions can help IT stay ahead of regulatory compliance

4 ways MDM solutions can help IT stay ahead of regulatory compliance | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Best practices for effectively securing sensitive data

Best practices for effectively securing sensitive data

Best practices for effectively securing sensitive data | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Security’s important place in the broader digital trust ecosystem

Security’s important place in the broader digital trust ecosystem

Security’s Important Place in the Broader Digital Trust Ecosystem | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2