Compliance does not equal security

Buy these widgets. Write these policies. Be compliant. Be secure. While certain industry bodies set specific cybersecurity standards and requirements, following them is not enough to protect your organization from cyber attacks and to achieve resilience. Security started with compliance Compliance was the primary driver for many businesses to build a cyber security program. Starting […]

Continue Reading

CIS Control 08: Audit Log Management

Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing the impact of network or data compromise in a timely manner. Collection logs and regular review is useful for identifying baselines, establishing operational trends, and detecting abnormalities. In some cases, logging may be the only evidence of a successful attack. […]

Continue Reading

Which technologies can help legal and compliance teams navigate a changing landscape of risk?

In this interview with Help Net Security, Zack Hutto, Director of Advisory Services at Gartner‘s Legal and Compliance Practice, talks about the challenges legal and compliance teams are facing and the technologies that can help them. What are today’s biggest challenges for legal and compliance teams? The global pandemic created acute pressure for corporate legal […]

Continue Reading