GDPR Compliance in the Cloud
In a previous GDPR series we discussed who is subject to GDPR guidelines, security requirements, tips for preparing, and penalties associated. To keep going with this series, we partnered with one of our partners, UnifyCloud, to speak to GDPR compliance in the cloud. If you are in the midst of moving to the cloud or already have some applications or workloads in the cloud (SaaS, IaaS, PaaaS, etc.), we put together a web recording to address concerns around ensuring GDPR compliance when it comes to XaaS services and third-party CSPs such as AWS and Azure.
GDPR Penalties for Non-Compliance
This is the final post in a series of 4 on GDPR. Part 1 covered who is subject to GDPR requirements, Part 2 identified data security requirements, and Part 3 covered how organizations should prepare.
What the GDPR Means to Organizations & How to Prepare
This is Post 3 in a series of 4 series on the basics of GDPR. Part 1 covered who is subject to GDPR requirements and Part 2 identified GDPR data security requirements. In this post, we’ll look at what the GDPR means for enterprise companies and how they should be preparing for the deadline - May 25th, 2018.
GDPR - Key Data Security Requirements
This is Part 2 in a 4 part series of posts that will help to educate you on GDPR, including who is affected, key requirements, implications, preparedness, and potential penalties.
Framework for GDPR Compliance
The General Data Protection Regulation (GDPR) impacts every business in the European Union(EU) or doing business in the EU even if their headquarters are outside EU borders.
Are You Ready for the GDPR Deadline: May 25, 2018?
If your company is doing business in the EU, you must be aware of the impending European General Data Protection Regulation (GDPR) enforcement deadline on May 25th, 2018.
7 Reasons to Hire a Virtual CISO
Is your data safe from motivated cyber criminals? CIO Magazine boldly stated that companies that can't or won't pay big money for top-level security talent run the risk of joining the ranks of Target, Home Depot, and many other big brands that have suffered from damaging security breaches.
Shadow IT Leads to Cloud Governance Problems
Remember the days when IT was in control of all hardware and software brought into the business?
Industry Insights - Just In Case You Missed It
Here are a few interesting articles from last week - including Gartner 2015 tech trends,cloud security, DCIM tools, and the APAC network roundup. Gartner lays out its top 10 tech trends for 2015 The Internet of things, and everything that's part of its universe, including smart machines, pervasive analytics, and 3D printing, are on Gartner's annual list of strategic technologies for the year ahead. The list, presented today by Garner analyst David Cearley at the firm's annual Symposium/ITxpo, is focused on merging the real world with the virtual one, what that means for analytics and the type of IT that has to emerge to deal with it.
StrataCore 2014 Q3 Newsletter
Featured Article: StrataCore Q2 Panel Series Event: Compliance in the Cloud Industry News: Billions Invested in Cloud Corporate Responsibility: Local Riding Team & Pediatric Cancer Therapies StrataCore Insiders: Organizational Changes at StrataCore
Reinvesting in IT Security: A Top Priority for Health Care Providers
Millions had their personal credit and debit card information stolen by hackers during the infamous cyber attack on the Target Corporation last year. This could have been prevented had Target’s decision-makers been vigilant with security measures. What if something like this were to happen to patients in health care facilities? Data breaches in the health care sector Breaches and infiltration attempts are widespread in the financial and retail sectors, but the health care community is not exempt from similar vulnerabilities. Health records contain protected health information (PHI), like names, dates of birth, addresses, Social Security numbers, and health insurance details. Hackers profit off this data, which can end up on a black market and be used for fraud. Health data breaches and theft are often the result of weak IT security systems and inexperienced IT security staff.
The PCI DSS Cloud Computing Guidelines
If you are a company that accepts, processes, transmits, or stores credit card payment information and you engage with a cloud service provider (CSP) to manage your infrastructure, it is important to understand how that impacts your PCI compliance management.