What is the American Data Privacy and Protection Act (ADPPA)?

What is the American Data Privacy and Protection Act (ADPPA)?

| | Blog, framework
The ADPPA is the most significant milestone the U.S. has ever reached in passing comprehensive federal privacy legislation. According to the Library of Congress, “This bill establishes requirements for how companies, including ...
CJIS Compliance Checklist: Are You Meeting All the Requirements?

CJIS Compliance Checklist: Are You Meeting All the Requirements?

| | Blog, framework
What is the CJIS? The Criminal Justice Information Services was established by the FBI in 1992 as an intelligence hub that connected the criminal justice community, including law enforcement, national security, and ...
How ISO Standards Address Third-party Risk Management

How ISO Standards Address Third-party Risk Management

ISO is one of the most widely used vendor risk management frameworks. Certification to ISO/IEC 27001 is usually not mandated unless a client requires it to enter into a contract with them ...
cybersecurity framework south korea data protection officer CCO

U.S.-South Korea Forge Strategic Cybersecurity Framework

The United States and South Korea have crafted a “Strategic Cybersecurity Cooperation Framework.” The framework is part of recent bilateral accords intended to signal mutual adversaries and reaffirm the “ironclad commitment to ...
Security Boulevard
Doing the Work: How to Architect a Systematic Security Program, Part 3

Doing the Work: How to Architect a Systematic Security Program, Part 3

Building a security program from the ground up is a complicated, complex undertaking that can pay massive dividends down the road. We firmly believe that “the devil is in the details,” in ...
Web3 Trust Dependencies: A Closer Look at Development Frameworks & Tools

Web3 Trust Dependencies: A Closer Look at Development Frameworks & Tools

In the world of headline-grabbing smart contract exploits, developers and other stakeholders often skew their security attention in one direction; namely, they tend to focus on on-chain code, yet often neglect framework ...
Measuring Up: How to Architect a Systematic Security Program – Part 2

Measuring Up: How to Architect a Systematic Security Program – Part 2

 In Part 1 of this series , we discussed how organizations can go about selecting a framework for implementation. In order to effectively measure your organization against the selected framework, the organization ...

4 tips to achieve Data Compliance

Data compliance is a crucial and essential factor in organizations that should be carefully followed for data management. Data compliance is more than maintaining relevant standards and regulations and ensuring that the ...
Framework Selection: How to Architect a Systematic Security Program – Part 1

Framework Selection: How to Architect a Systematic Security Program – Part 1

A need for public trust in information systems has driven continuous technological advances and new regulatory requirements, which have in turn made the global cyber threat landscape more complex and connected (see ...
Lacework cloud security fortinet Juniper strategy IAM Datadog CSA cloud security SMBs cloud

How to Build a Cloud Security Strategy

As the head of security at a cloud-forward organization, you are a security and risk expert with strong business acumen. On your shoulders falls the difficult task of detecting security issues as ...
Security Boulevard