Tag: compliance
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
Mehr Sicherheit beim Managed File Transfer für kritische Infrastrukturen
Schutz vor Bedrohungen und Compliance-Risiken in komplexen KRITIS-Umgebungen. Organisationen im Bereich kritische Infrastrukturen (KRITIS) sehen sich mit wachsenden Cybersicherheitsbedrohungen, strengen Regulatorien und operativer Komplexität konfrontiert. Ob im Industrie- und Fertigungsbereich, dem Banken-, Finanz- und Versicherungssektor oder für Behörden ein auf Sicherheit fokussierter Managed File Transfer (MFT) ist heutzutage grundlegend, um hochsensible Daten und kritische… First…
-
Seceon for Finance: Safeguarding the Digital Economy
In today’s hyper-connected economy, financial institutions operate across cloud systems, digital payment networks, and third-party integrations, forming the nerve center of global commerce. But with this connectivity comes unprecedented exposure to cyber risk. From ransomware and insider threats to compliance violations, financial organizations face an expanding threat landscape where a single breach can cost First…
-
BreachLock Named Representative Provider for Penetration Testing as a Service (PTaaS) in New Gartner® Report
BreachLock, the global leader in Penetration Testing as a Service (PTaaS), has been recognized as a Representative Provider in the 2025 Innovation Insight: Penetration Testing as a Service report by Gartner. The report highlights how PTaaS helps organizations increase testing frequency by automating routine tasks, supports compliance objectives with high-level standardization and customizable reporting, and…
-
New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
State cybersecurity regulations that apply to some hospitals in New York state go well compliance under the federal HIPAA security rule, posing expanded data governance challenges for providers, said Matthew Bernstein of consulting firm Bernstein Data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-york-hospitals-are-facing-tougher-cyber-rules-than-hipaa-i-5498
-
New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
State cybersecurity regulations that apply to some hospitals in New York state go well compliance under the federal HIPAA security rule, posing expanded data governance challenges for providers, said Matthew Bernstein of consulting firm Bernstein Data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-york-hospitals-are-facing-tougher-cyber-rules-than-hipaa-i-5498
-
New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
State cybersecurity regulations that apply to some hospitals in New York state go well compliance under the federal HIPAA security rule, posing expanded data governance challenges for providers, said Matthew Bernstein of consulting firm Bernstein Data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-york-hospitals-are-facing-tougher-cyber-rules-than-hipaa-i-5498
-
The Compliance Automation Revolution 2025
In 2025, compliance is no longer a box-ticking exercise, it’s a strategic business imperative. With new regulations like the EU’s NIS2 Directive, DORA for financial services, CMMC 2.0 for U.S. defense, and the Australian Privacy Act 2024, enterprises face tougher obligations, faster reporting timelines, and penalties reaching into the tens of millions. Yet most First…
-
Boost data security with attestation of compliance: Essential for [yy]
Data is one of the most valuable assets organizations possess. As data volumes grow and cyberthreats evolve, ensuring data security is more critical than ever. One of the most effective measures in safeguarding sensitive information is through the attestation of compliance. Data security is no longer a luxury reserved for large corporations; it is a…The…
-
Beyond the checklist: Building adaptive GRC frameworks for agentic AI
Tags: access, ai, breach, ciso, cloud, compliance, control, crime, data, detection, endpoint, finance, framework, fraud, governance, grc, international, metric, monitoring, nist, risk, risk-management, strategy, supply-chain, switchAutonomous agent drift First, I experienced an autonomous agent drift that nearly caused a severe financial and reputational crisis. We deployed a sophisticated agent tasked with optimizing our cloud spending and resource allocation across three regions, giving it a high degree of autonomy. Its original mandate was clear, but after three weeks of self-learning and…
-
13 cybersecurity myths organizations need to stop believing
Tags: access, ai, attack, authentication, backup, banking, breach, business, ceo, compliance, computer, computing, corporate, credentials, cyber, cybersecurity, data, data-breach, deep-fake, defense, encryption, finance, government, group, identity, incident response, infrastructure, jobs, law, malicious, mfa, monitoring, network, nist, openai, passkey, password, phishing, privacy, regulation, risk, service, skills, strategy, technology, theft, threat, tool, vulnerabilityBig tech platforms have strong verification that prevents impersonation: Some of the largest tech platforms like to talk about their strong identity checks as a way to stop impersonation. But looking good on paper is one thing, and holding up to the promise in the real world is another.”The truth is that even advanced verification…
-
Privacy Leaders Now Bridge AI, Data and Business Goals
Jumio’s Joe Kaufmann on How CPOs Drive Value by Aligning Privacy With Business. Privacy leaders are taking on strategic roles as artificial intelligence and data protection laws evolve. Jumio’s Global Privacy Head Joe Kaufmann said chief privacy officers now help build data trust, manage compliance and enable business growth through responsible data use. First seen…
-
Cyberresilienz im Gesundheitswesen: Wie Angriffe die Versorgung gefährden
Proofpoint, ein Cybersecurity- und Compliance-Unternehmen, und das Ponemon Institute, ein Forschungsunternehmen im Bereich IT-Sicherheit, haben die Ergebnisse ihrer vierten jährlichen Umfrage zu den Auswirkungen der Cybersicherheit im Gesundheitswesen veröffentlicht. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/gesundheitswesen-angriffe-versorgung
-
Cyberresilienz im Gesundheitswesen: Wie Angriffe die Versorgung gefährden
Proofpoint, ein Cybersecurity- und Compliance-Unternehmen, und das Ponemon Institute, ein Forschungsunternehmen im Bereich IT-Sicherheit, haben die Ergebnisse ihrer vierten jährlichen Umfrage zu den Auswirkungen der Cybersicherheit im Gesundheitswesen veröffentlicht. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/gesundheitswesen-angriffe-versorgung
-
No Good Deed Goes Unpunished: Why Voluntary Disclosure of Cybersecurity Violations Doesn’t Mean You Won’t Be Punished for Bad Security
Voluntary cybersecurity disclosure reduces penalties but not liability. In compliance, honesty helps”, but it’s no safe harbor. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/no-good-deed-goes-unpunished-why-voluntary-disclosure-of-cybersecurity-violations-doesnt-mean-you-wont-be-punished-for-bad-security/
-
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE
Sovereign Data, Sovereign Access: Introducing Modern FIDO Authentication for SAS PCE andrew.gertz@t“¦ Mon, 10/13/2025 – 14:53 Discover how Thales empowers enterprises with sovereign access through FIDO authentication in SAS PCE”, ensuring secure, phishing-resistant identity control for hybrid environments. Identity & Access Management Access Control Guido Gerrits – Field Channel Director, EMEA More About This Author…
-
So gelingt die Balance zwischen Risiko und Innovation bei der künstlichen Intelligenz
Unternehmen stehen heute vor der Aufgabe, ihre Governance, Risiko- und Compliance-Systeme (GRC) grundlegend neu zu denken. Die rasante Etablierung künstlicher Intelligenz (KI) im Unternehmensalltag und die Regulierung durch den EU-AI-Act zwingen Organisationen dazu, über klassische Compliance- und Risikomanagementtools hinauszugehen und proaktive KI-Governance zu etablieren. Entscheidend ist dabei: Wer jetzt strategisch handelt, um die Anforderungen an…
-
So gelingt die Balance zwischen Risiko und Innovation bei der künstlichen Intelligenz
Unternehmen stehen heute vor der Aufgabe, ihre Governance, Risiko- und Compliance-Systeme (GRC) grundlegend neu zu denken. Die rasante Etablierung künstlicher Intelligenz (KI) im Unternehmensalltag und die Regulierung durch den EU-AI-Act zwingen Organisationen dazu, über klassische Compliance- und Risikomanagementtools hinauszugehen und proaktive KI-Governance zu etablieren. Entscheidend ist dabei: Wer jetzt strategisch handelt, um die Anforderungen an…
-
So gelingt die Balance zwischen Risiko und Innovation bei der künstlichen Intelligenz
Unternehmen stehen heute vor der Aufgabe, ihre Governance, Risiko- und Compliance-Systeme (GRC) grundlegend neu zu denken. Die rasante Etablierung künstlicher Intelligenz (KI) im Unternehmensalltag und die Regulierung durch den EU-AI-Act zwingen Organisationen dazu, über klassische Compliance- und Risikomanagementtools hinauszugehen und proaktive KI-Governance zu etablieren. Entscheidend ist dabei: Wer jetzt strategisch handelt, um die Anforderungen an…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
What to look for in a data protection platform for hybrid clouds
Tags: access, advisory, ai, attack, automation, backup, breach, business, cisco, cloud, compliance, computing, control, corporate, data, defense, encryption, endpoint, framework, gartner, google, governance, government, group, guide, ibm, identity, infrastructure, intelligence, Internet, iot, kubernetes, law, malware, metric, microsoft, monitoring, network, oracle, privacy, ransomware, regulation, risk, risk-assessment, saas, service, software, technology, threat, tool, veeam, vmware, vulnerability, zero-trusthybrid cloud data protection buyer’s guide today!] In this buyer’s guide Data protection for hybrid clouds explainedWhy hybrid clouds need data protectionWhat to look for in a data protection platform for hybrid cloudsMajor trends in data protection for hybrid cloudsLeading vendors for data protection of hybrid cloudsWhat to ask before buying data protection for hybrid…
-
How Reassured Are You by Your Cloud Compliance?
The Vital Role of Non-Human Identities in Cloud Compliance What makes cloud compliance an intricate challenge for modern enterprises? With digital transformation accelerates, businesses across various sectors face the critical task of ensuring robust cloud compliance. At the heart of this endeavor lies the intricate management of Non-Human Identities (NHIs)”, a domain that demands meticulous…

