Compliance News, Articles and Updates

SWIFT did not monitor weak security practices of its users - report

SWIFT did not monitor weak security practices of its users - report

By

Former board members and senior employees at SWIFT, said the company did not monitor or make attempts to improve the poor security practices of its clients.

Apple blocks Pangu jailbreak bug with OS upgrade 9.3.4

Apple blocks Pangu jailbreak bug with OS upgrade 9.3.4

By

Apple quietly issued "an important security" update on Thursday to its operating system pushing out iOS 9.3.4.

Feds nix SMS-based 2FA

Feds nix SMS-based 2FA

By

Government service providers will be required to phase out the use of SMS-based two-factor authentication (2FA) as the result of new guidelines from the National Institute of Standards and Technology (NIST).

ISA presents 12-step cybersecurity program at RNC cyber forum

ISA presents 12-step cybersecurity program at RNC cyber forum

By

ISA President Larry Clinton urged lawmakers to treat cybersecurity "with a greater sense of urgency," saying in a release that the economics of cybersecurity need to be better integrated into policies.

House committee grills FDIC after report details history of data breach cover-ups

House committee grills FDIC after report details history of data breach cover-ups

By

An interim report filed yesterday by the U.S. House Committee on Science, Space and Technology revealed gaping holes in the FDIC's cybersecurity posture and accused the financial institution of withholding documents pertaining to data breaches.

Ninth Circuit ruling upholds password-sharing risk

Ninth Circuit ruling upholds password-sharing risk

By

Computer users sharing their password could suddenly find themselves at risk for arrest.

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?

By

London is the center of tech startups in Europe. So, how will the U.K.'s separation from the EU impact the tech sector?

HR vendor Empathia hit by potential breach

HR vendor Empathia hit by potential breach

By

Human resources vendor Empathia announced a potential data breach affecting its employee assistance program.

Survey: 85 percent of senior security pros say more than half of IoT products are not secure

Survey: 85 percent of senior security pros say more than half of IoT products are not secure

By

The proportion of executives who continue to distrust IoT as a secure technology is overwhelming, if a new survey from research-oriented security service firm IOActive is any indication.

Sweet validation: Apple versus FBI

Sweet validation: Apple versus FBI

By

CISOs say the Apple-FBI case confirms the need for strong encryption and IT security programs. Steve Zurier reports.

Compliance at risk

Compliance at risk

A federal data breach notification law would provide much needed uniformity, says David R. Singh.

Ponemon: 89% of surveyed health care orgs breached in last two years; cybercrime top cause

Ponemon: 89% of surveyed health care orgs breached in last two years; cybercrime top cause

By

For the second consecutive year, Ponemon Institute's annual study on the state of security and privacy in health care found that cybercrime was the leading cause of data breaches among hospitals and other medical providers.

Emails raise more questions of Clinton infosec practices

Emails raise more questions of Clinton infosec practices

By

Recently released documents set off renewed discussions about Hillary Clinton's information security practices as former U.S. Secretary of State.

Tampa airport to conduct major IT security audit following apparent breach

Tampa airport to conduct major IT security audit following apparent breach

By

Tampa International Airport has expedited and expanded an audit of its network security, following the resignation of an IT consultant who was allegedly found to have shared system passwords with unauthorized parties.

Government requests to Apple for customer data drop

Government requests to Apple for customer data drop

By

Germany, the United States and Australia were not shy when it came to asking Apple for customer information filing thousands of requests in the second half of 2015.

Microsoft's data portal adds new cloud certifications

Microsoft's data portal adds new cloud certifications

By

Microsoft is rolling out new certifications provided through the company's data portal.

Report: 10% of large companies do not use any cybersecurity framework

Report: 10% of large companies do not use any cybersecurity framework

By

A new report found that 16% of organizations do not use any cybersecurity framework and even among companies with more than 10,000 employees, 10% do not currently use a security framework.

Privacy shield: Officials give "written assurances" over limiting bulk data collection

Privacy shield: Officials give "written assurances" over limiting bulk data collection

The Privacy Shield negotiations have produced an unprecedented agreement between the US and the EU that there will be safeguards against the bulk collection of the EU citizens' data but critics are unconvinced.

Google adds HTTPS report card to transparency report; 77 percent of its traffic encrypted

Google adds HTTPS report card to transparency report; 77 percent of its traffic encrypted

By

For the first time, Google has added an HTTPS report card to its Transparency Report, tracking its progress toward its stated goal of 100 percent SSL/TSL encryption of data in transit.

Researcher bashes cert programs for giving high marks to flawed AV programs

Researcher bashes cert programs for giving high marks to flawed AV programs

By

A new blog post by security researcher Tavis Ormandy chastises security software certification programs for giving antivirus products high grades despite the presence of multiple low-hanging vulnerabilities.

White House requires agencies to share custom code with open-source community

White House requires agencies to share custom code with open-source community

By

The White House has released a draft of its Source Code Policy, which establishes rules for sharing custom software between federal agencies, in hopes of improving government access to applications and reducing development costs.

Exclusive: Commerce Dept. official defends Privacy Shield

Exclusive: Commerce Dept. official defends Privacy Shield

By

A senior U.S. Department of Commerce official spoke with SCMagazine.com Friday morning to defend the virtues of the newly introduced U.S.-EU Privacy Shield pact.

FTC orders nine companies to provide details on PCI DSS audit process

FTC orders nine companies to provide details on PCI DSS audit process

By

The FTC has ordered nine companies to provide information on the way they assess whether retailers and others are in compliance with Payment Card Industry Data Security Standards (PCI DSS).

DoD policy delegates cybersecurity compliance responsibilities to military leaders

DoD policy delegates cybersecurity compliance responsibilities to military leaders

By

The DoD has publicly disclosed its new Cybersecurity Discipline Implementation Plan, which assigns leaders across all military branches greater responsibility for fortifying operational systems against cyber intrusions.

Electronic Frontier Foundation opinion piece pokes holes in EU-U.S. Privacy Shield

Electronic Frontier Foundation opinion piece pokes holes in EU-U.S. Privacy Shield

By

Digital rights group the Electronic Frontier Forum (EFF) yesterday came out swinging against the Privacy Shield, the intended successor to the recently invalidated EU-U.S. Safe Harbor agreement.

Report: 41 percent of younger IT pros have hacked

Report: 41 percent of younger IT pros have hacked

By

A survey of IT professionals casts light on some of the trust and compliance challenges that plague the information security sector.

Ray Rothrock: "Assume attackers are in your system"

Ray Rothrock: "Assume attackers are in your system"

By

As cyber attacks continue to increase, IT departments continue to be challenged by older techniques, such as targeted phishing attacks, because the attacks bypass perimeter defenses and are difficult to prevent.

Survey: 64 percent of IT execs think achieving basic compliance will stop most breaches

Survey: 64 percent of IT execs think achieving basic compliance will stop most breaches

By

64 percent of more than 1,100 IT security executives believe that simply meeting cybersecurity compliance requirements, as opposed to striving for best practices, is "very" or "extremely" effective at preventing data breaches.

Report: Half of law firms do not have a data protection committee

Report: Half of law firms do not have a data protection committee

By

Two reports by a legal competitive intelligence group shed light on how perspectives are shifting among legal professionals.

Moody's: Cyber risks will impact credit ratings

Moody's: Cyber risks will impact credit ratings

By

Moody's will begin to place more weight on considerations related to cyber risks when issuing credit ratings, the agency announced in a report.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US