Regulatory Compliance

Is it Illegal to Listen to a Podcast or Watch a Movie Online?
Defining wire communications, and whether the wiretap statute makes it illegal to listen to a podcast or watch a movie online? ...
Security Boulevard

Actionable Protection Strategies for 2025 with Shrav Mehta
Shrav Mehta explores lessons from 2024’s costliest data breaches and provides actionable protection strategies for 2025. Shrav and Alan analyze the current cybersecurity landscape and discuss how businesses can strengthen their defenses. ...
Security Boulevard

Spotlight on Regulatory Compliance: The Challenges Your IT and Security Teams May Face
Businesses face increasing pressure to maintain compliance across regions, mitigate risks and improve consumer protection and stakeholder trust. ...
Security Boulevard

It’s Time for Defense Tech Companies to Get Ahead of CMMC Before They Get Left Behind
Chris Petersen | | CMMC (Cybersecurity Maturity Model Certification), Defense Tech Companies Compliance, NIST SP 800-171 Rev. 2, Supplier Performance Risk System (SPRS)
The Cybersecurity Maturity Model Certification (CMMC) process is just around the corner and is expected by most to go into effect early next year. This is why defense tech companies need to ...
Security Boulevard

A Gold Standard for Compliance: Why ISO 27001 is More Relevant Than Ever
With risks increasing and regulatory mandates growing in number, many organizations need a unified approach to compliance and security ...
Security Boulevard

Our Digital Footprints are Breadcrumbs for Mapping our Personal Behavior
Sulagna Saha | | @TechFieldDay, @TheFuturumGroup, AI, Consumer behavior analysis, Data breach, data protection regulation, Meta
The Government Accountability Office states that customers are usually unaware of the potential privacy risks and biases that arise from use of personal information ...
Security Boulevard

2025 Cybersecurity Predictions: A Strategic Roadmap for the C-Suite
By staying attuned to trends, C-suite leaders can drive security strategies that not only protect but also empower the business to thrive ...
Security Boulevard

5 Reasons to Create a Certificate Lifecycle Management Policy for the New Year
A CLM policy also puts you in the best position to mitigate and prevent cyberthreats, including man-in-the-middle attacks and phishing scams ...
Security Boulevard

Shedding AI Light on Bank Wire Transfer Fraud
Shai Gabay | | AI, bank wire fraud, business email compromise, Deepfake Technology, ERP, payment security, wire transfer fraud
Wire transfer fraud occurs when scammers convince a company to send money to a fraudulent account. While weeding out suspicious requests like this may seem rudimentary, it’s not ...
Security Boulevard

(In)Fidelity Admits Data Breach 8 Weeks Ago — 77K PII Lost
Richi Jennings | | Access control, Access control and Identity Management, access control issues, Access Controls, and Access Control in Security+, asset management, Authentication, authorization, Banking/Fintech, broken access controls, cloud data access control, cybersecurity access controls, cybersecurity in fintech, data access control, Fidelity Investments, Fintech, fintech industry, fintech sector, improper access control, SB Blogwatch
FMR FAIL: Huge investment firm won’t say how it was hacked ...
Security Boulevard