GDPR Compliance in the Cloud - Featured Image

GDPR Compliance in the Cloud

In a previous GDPR series we discussed who is subject to GDPR guidelines, security requirements, tips for preparing, and penalties associated. To keep going with this series, we partnered with one of our partners, UnifyCloud, to speak to GDPR compliance in the cloud. If you are in the midst of moving to the cloud or already have some applications or workloads in the cloud (SaaS, IaaS, PaaaS, etc.), we put together a web recording to address concerns around ensuring GDPR compliance when it comes to XaaS services and third-party CSPs such as AWS and Azure.
GDPR Penalties for Non-Compliance - Featured Image

GDPR Penalties for Non-Compliance

This is the final post in a series of 4 on GDPR. Part 1 covered who is subject to GDPR requirements, Part 2 identified data security requirements, and Part 3 covered how organizations should prepare.
What the GDPR Means to Organizations & How to Prepare - Featured Image

What the GDPR Means to Organizations & How to Prepare

This is Post 3 in a series of 4 series on the basics of GDPR. Part 1 covered who is subject to GDPR requirements and Part 2 identified GDPR data security requirements. In this post, we’ll look at what the GDPR means for enterprise companies and how they should be preparing for the deadline - May 25th, 2018.
GDPR - Key Data Security Requirements - Featured Image

GDPR - Key Data Security Requirements

This is Part 2 in a 4 part series of posts that will help to educate you on GDPR, including who is affected, key requirements, implications, preparedness, and potential penalties. 
Framework for GDPR Compliance - Featured Image

Framework for GDPR Compliance

The General Data Protection Regulation (GDPR) impacts every business in the European Union(EU) or doing business in the EU even if their headquarters are outside EU borders.
Are You Ready for the GDPR Deadline: May 25, 2018? - Featured Image

Are You Ready for the GDPR Deadline: May 25, 2018?

If your company is doing business in the EU, you must be aware of the impending European General Data Protection Regulation (GDPR) enforcement deadline on May 25th, 2018.
7 Reasons to Hire a Virtual CISO - Featured Image

7 Reasons to Hire a Virtual CISO

Is your data safe from motivated cyber criminals? CIO Magazine boldly stated that companies that can't or won't pay big money for top-level security talent run the risk of joining the ranks of Target, Home Depot, and many other big brands that have suffered from damaging security breaches.
Shadow IT Leads to Cloud Governance Problems - Featured Image

Shadow IT Leads to Cloud Governance Problems

Remember the days when IT was in control of all hardware and software brought into the business?
Industry Insights - Just In Case You Missed It - Featured Image

Industry Insights - Just In Case You Missed It

Here are a few interesting articles from last week - including Gartner 2015 tech trends,cloud security, DCIM tools, and the APAC network roundup. Gartner lays out its top 10 tech trends for 2015 The Internet of things, and everything that's part of its universe, including smart machines, pervasive analytics, and 3D printing, are on Gartner's annual list of strategic technologies for the year ahead. The list, presented today by Garner analyst David Cearley at the firm's annual Symposium/ITxpo, is focused on merging the real world with the virtual one, what that means for analytics and the type of IT that has to emerge to deal with it.
StrataCore 2014 Q3 Newsletter - Featured Image

StrataCore 2014 Q3 Newsletter

Featured Article: StrataCore Q2 Panel Series Event: Compliance in the Cloud  Industry News: Billions Invested in Cloud  Corporate Responsibility: Local Riding Team & Pediatric Cancer Therapies  StrataCore Insiders: Organizational Changes at StrataCore  
Reinvesting in IT Security: A Top Priority for Health Care Providers - Featured Image

Reinvesting in IT Security: A Top Priority for Health Care Providers

Millions had their personal credit and debit card information stolen by hackers during the infamous cyber attack on the Target Corporation last year. This could have been prevented had Target’s decision-makers been vigilant with security measures. What if something like this were to happen to patients in health care facilities? Data breaches in the health care sector Breaches and infiltration attempts are widespread in the financial and retail sectors, but the health care community is not exempt from similar vulnerabilities. Health records contain protected health information (PHI), like names, dates of birth, addresses, Social Security numbers, and health insurance details. Hackers profit off this data, which can end up on a black market and be used for fraud.  Health data breaches and theft are often the result of weak IT security systems and inexperienced IT security staff.
The PCI DSS Cloud Computing Guidelines - Featured Image

The PCI DSS Cloud Computing Guidelines

If you are a company that accepts, processes, transmits, or stores credit card payment information and you engage with a cloud service provider (CSP) to manage your infrastructure, it is important to understand how that impacts your PCI compliance management.