Understanding Saudi Arabia's NDMO Standards
A new framework from Saudi Arabia's National Data Management Office (NDMO) is aiming to simplify privacy and compliance in the country.
A new framework from Saudi Arabia's National Data Management Office (NDMO) is aiming to simplify privacy and compliance in the country.
POPIA, South Africa's Protection of Personal Information Act, establishes rules for the lawful processing of personal information in South Africa. This blog looks at the purpose of the law, POPIA compliance best practices, and more.
As Congress works to minimize regulatory headaches for compliant organizations, cyberattacks hailing from North Korea and the Kremlin continue, while cyber insurance rates are plummeting. Get caught up to speed on all these stories in this week's Friday Five recap.
Implementing risk taxonomy at your organization can help break down risks into categories and manage potential threats. Learn how it works and the steps required to create risk taxonomy in today's blog.
While this past week brought good and bad news in the world of ransomware, agencies and lawmakers are fighting to keep up with evolving cybercrime trends. Catch up on these stories and more in this week's Friday Five.
Catch up on the ongoing fight against cybercrime platforms, ransomware and other malware, updated compliance rules for healthcare organizations, and more — all in this week's Friday Five.
This past week's headlines were led by stories on upcoming regulatory improvements, why organizations are still struggling to keep up with them, the possibility of a new Cyber Force, and more. Learn all you need to know in this week's Friday Five.
Audit log best practices include defining clear log policies, regularly reviewing logs, and maintaining the integrity and use of management tools. Learn more audit best practices in today's blog.
In India, new CERT-In guidelines for security breaches have introduced new requirements for businesses to comply with, including one that requires organizations to report certain cybersecurity incidents to the office within six hours of discovery.
While research suggests cybersecurity measures are mitigating Zero Day threats more effectively, threat actors are getting better at exploiting the threats that remain. Meanwhile, cyber threats related to AI continue to emerge, and CISA is refining its incident reporting requirements. Get up to speed on these stories and more in this week's Friday Five.