February 2020 | SC Media

Print Issue: February 2020

Compliance: Watch your step!

Avoiding the perilous pitfalls of compliance It’s no secret that Fortune 1000 CISOs struggle with compliance, but the pitfalls that fuel the most fury aren’t typically the ones with regulators (although regulator arguments do come in a close second). No, the battle is often internal, such as fighting over jurisdiction, with the California Consumer Privacy Act…

Ringing in a new National Privacy Law?

Privacy advocates have long called for a federal privacy law and it’s coming…in the mean time, experts say complying with the CCPA will lay the groundwork for future compliance with a federal law. Like revelers packing Times Square on New Year’s Eve waiting for the ball to drop, a close teeming crowd of organizations spent the…

Hang-ups, hold-ups and hurdles passing federal privacy legislation

What are the biggest points of contention impeding passage of federal privacy legislation (and 3 other security laws)? Government at any level is infamous for moving at a snail’s pace, as politics, red tape and competing interests often get in the way of progress. Technology, on the other hand, moves at lightning speed.  Unfortunately, this…

States weigh in on cybersecurity

With the focus trained on national legislation to safeguard data and privacy, legislative activity at the state level often gets overlooked, though it has flourished in recent years. Many states either passed, rejected or have pending bills primarily focused on compelling businesses to inform customers about how their data is used. Here is a quick…

Confidential Computing: The confidentiality of data in business is at peak recognition

The challenge of protecting data in use is becoming more and more urgent as data leaks continue unabated. This urgent need is creating waves in the industry forcing key players to take action and initiatives that have already formed to make the move to confidential computing more achievable.  One of these initiatives is the Confidential Computing Consortium…

IllenaArmstrong

How a bill becomes a compliance ask

It takes a minute for a regulatory mandate to hit the masses. Typically, after months or even longer, of “sitting in committee,” political punting, pontificating, organizational lobbying, debating, usually lots more pontificating and punting, that a bill that may have been “sitting on Capitol Hill” (thank you, Schoolhouse Rock, you classic, you) might be signed…

SC Labs product reviews: Email security

The use of collaborative tools and technologies is on the rise with email topping the list. That explains why it faces such relentless attacks. Email communications are leveraged to keep businesses running efficiently, but unfortunately, is often overlooked when it comes to implementing adequate security measures. Tools in the past have focused mainly on spam…

Avanan 2.5.9

Avanan, a prevention-focused SaaS product, works at the cloud level to protect against malicious intruders before they even get to a device, providing this visibility in a single pane of glass by leveraging APIs. This product does not sit in front of Gmail or Office 365 and does not change the MX record. Instead, it…

BitDam ATP for Email

BitDam ATP for Email scans files and links to detect and block malicious attachments and URLs embedded in emails before they can be delivered. BitDam uses a baseline knowledge of normal business application usage and creates a whitelist to determine whether a file or link is malicious. The anomalous detection approach stops all unfamiliar attacks…

Next hm-product-review in Reviews