Learn more about how the CCPA has put pressure on some of the largest tech companies to re-evaluate how the...
Other content in this Stream
As different countries get mixed results from contact tracing apps, would it be worth exploring a mandatory contact tracing program? Let's find out.
Contact tracing apps have become critical tools for managing the spread of COVID-19, but are we trading-off data privacy to battle the virus?
SB327 is a new frontier in lawmaking because while it’s fascinating how technology becomes regulated, it’s even more fascinating to see it evolve.
Learn more about how the CCPA has put pressure on some of the largest tech companies to re-evaluate how they handle personal information.
SD Elements enables CSPs to set up and develop their FedRAMP continuous compliance initiatives in a coherent and structured way
Learn about the two distinct ways to demonstrate FedRAMP compliance & obtain a FedRAMP Authority to Operate (ATO).
Learn more about the risks of shadow IT.
Learn how to comply with GDPR's Article 25, 'Data Protection by Design and Default.'
Learn how to comply with the NY DFS Cybersecurity Regulation in your organization.
Developed in partnership with a large tech company client.
Data privacy in the EU will soon be guided by two regulations: the General Data Protection Regulation (GDPR), which most people are familiar with, and the ePrivacy Regulation.
Learn what Security Compass COO, Rohit Sethi, has to say about GDPR Article 25.
Security Compass has recently announced an update to its flagship policy-to-execution platform, SD Elements. The update includes an action-oriented risk policy that gives users a summary of their...
Security Compass Offers Automated GDPR Data Protection by Design and Default Solution for Agile Developers. SD Elements Helps Streamline GDPR Article 25 Compliance Requirements TORONTO,...
By Mina Miri and Nathanael Mohammed General Data Protection Regulation (GDPR) will change the way the European Union handles personal information by enforcing strict guidelines on how that...
It is easy to be skeptical about PCI Compliance and the requirement to deploy Training to satisfy a checklist item. This idea that a checklist approach cannot help with security is not new. But...