White House CISA open source cybersecurity low-code/no-code application CISA cybersecuity threat cybersecurity fellowship web app election security government

CISA Pressures Federal Civilian Agencies to Secure Network Devices

CISA put federal civilian agencies on notice that they were expected to secure network devices within 14 days of discovering they had been exposed on the internet ...
Security Boulevard

Learning from the Fallout | A Massive $1.3 Billion Fine for Violating EU’s Cross-Border Data Transfer Regulation

Social Media Giant Fined a Whopping $1.3 Billion On May 22, 2023, Ireland's Data Protection Commissioner (DPC) hit the social media behemoth Meta (previously Facebook) with an alarming $1.3 billion fine for ...

ANPD’s Regulation on Administrative Sanctions: The Basics To Know

The Lei Geral de Proteção de Dados Pessoais, or General Personal Data Protection Law (LGPD), is the primary data protection and data privacy law in effect within the Federative Republic of Brazil ...

A Guide to Healthcare Compliance Regulations

Healthcare compliance is a broad term. In essence, it refers to an organization’s extensive efforts to ensure they have the relevant and appropriate measures, procedures, processes, and personnel to prevent fraud, waste, ...

Interpreting the Key Points of The 2022 IBM i Marketplace Survey Results

This year marks the eighth edition of the popular IBM i Marketplace Survey Results. Each year, HelpSystems collects data about how companies utilize the IBM i platform and the IT enterprises it ...
Colonial Pipeline, lessons, vulnerabilities pipedream supply chains CI/CD pipeline dev environment Linux

TSA Issues Directive to Prevent Another Colonial Pipeline Attack

Following months of pushback from private industry, the Transportation Security Administration (TSA) reissued a revised version of its cybersecurity directive for oil and natural gas pipeline owners and operators. The directive follows ...
Security Boulevard
Why is Data Privacy an Immediate Enterprise Priority?

Why is Data Privacy an Immediate Enterprise Priority?

In the past ten years, the rise of privacy-conscious consumers and emerging data regulations have compelled enterprises to prioritize their data management programs. Read more to learn how data privacy has become ...
cars automakers

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

If I were to ask you to imagine someone hacking a car, what’s the first thing that comes to mind? Let me guess: You’re picturing someone wearing a black hoodie and a ...
Security Boulevard
regulations

Gov’t Cybersecurity Standards Not Enough to Protect Consumers

The EU’s proposed Cyber Resilience Act, which would introduce cybersecurity standards and regulations for all products and connected devices, is not enough to actually mitigate the increasing risk of cyberattacks. There is ...
Security Boulevard
CISO Stories Podcast: Which Approach Wins - Compliance or Risk?

CISO Stories Podcast: Which Approach Wins – Compliance or Risk?

Cybersecurity programs have evolved from the early days of compliance with regulations. Regulations are important and provide the necessary motivation for many organizations to implement security controls that may not otherwise be ...