Written by Troy Leach, Chief Strategy Officer (CSO), CSA. We require a modern approach to accurately assess our use of current technology. This month marks 25 years since I managed my first ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Texas Attorney General Ken Paxton has successfully challenged Google’s monopolistic practices, with the U.S. District Court for the District of Columbia ruling in favor of Paxton’s allegations. The ...
It should shock no one that financial services organizations are a major target for cybercrime. In fact, according to the World Economic Forum, financial organizations are the number 2 target, ...
Written by Erick Tauil, Presales Engineer. Alright, let’s dive into a topic that often feels like a riddle wrapped in an enigma: Zero Trust. Communicating its concepts to non-security stakeholders can ...
Originally published by CXO REvolutionaries. Written by Mike Gemza, CTO, Cornerstone Building Brands. At a time when cyberthreats are becoming more advanced and network infrastructure needs are ...
Governance, Risk, and Compliance (GRC) demands continuous adaptation and vigilance, transcending its role as a mere business necessity. In the ever-changing world of compliance, companies are often ...
The security and compliance landscape is ever-evolving, meaning the demands organizations need to meet today can change rapidly. While most IT teams have defined processes to handle these requirements ...
Originally published by Scrut Automation. Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation. On July 12, 2024, the European Union (EU) Official Journal published the full ...