Compliance

The latest compliance technology and best practices to help organizations meet data privacy and security requirements.

  • Vulnerability Management Policy Template

    How to use this template: Comments intended to guide understanding and use of this template will be enclosed in brackets “[…]” and the ‘company’ will be listed as [eSecurity Planet] throughout the document. When converting this template to a working policy, eliminate the bracketed sections and replace “[eSecurity Planet]” with the name of your organization.…


  • Top 5 Cyber Insurance Companies to Work With

    Compare the Best Cyber Insurance Companies for 2023. Protect your business from cyber threats with the right coverage.


  • Automated Security and Compliance Attracts Venture Investors

    In 2013, Adam Markowitz founded Portfolium, an edtech startup that matched college students and graduates with employers. “I remember the first time we were asked for a SOC 2 report, which quickly became the minimum bar requirement in our industry for proof of an effective security program,” he said. The process for creating the report…


  • Sample Patch Management Policy Template

    How to use this template: Comments intended to guide understanding and use of this patch management policy template will be enclosed in brackets “[…]” and the ‘company’ will be listed as [eSecurity Planet] throughout the document. When converting this template to a working policy, eliminate the bracketed sections and replace “[eSecurity Planet]” with “YourCompanyName.” This…


  • Uber Guilty Verdict Raises Security Stakes for CSOs

    In a case that ups the stakes for CSOs dealing with data breaches, former Uber chief security officer Joe Sullivan was found guilty by a federal jury earlier this week of obstructing justice and of misprision (concealing) of a felony in connection with his coverup of a 2016 breach. United States Attorney Stephanie M. Hinds…


  • New SEC Cybersecurity Rules Could Affect Private Companies Too

    For years, the U.S. Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. However, after minimal corporate adoption of stronger cybersecurity, the SEC has drafted rules to require more formal cybersecurity reporting and disclosure. This requirement copies the strategies of previous legislation that dramatically improved financial reporting for both public and…


  • Security in Milliseconds: Visa Invests in Payment Security as E-Commerce Surges

    The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe. But that spending surge has brought with it a corresponding rise in payment security challenges. eSecurity Planet sat down with Dustin White, chief risk data officer at Visa, to discuss some of the…


  • Data Deletion Methods: What’s Best for Sensitive Data?

    Users may believe that when they delete a file on their hard drive, the document no longer exists. However, IT professionals understand that the data itself may remain. Yet even experienced IT professionals may not understand the differences between different types of hard drive file erasure, data overwrite standards, or when those methods might fail…


  • Three Ways to Protect Unfixable Security Risks

    How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack with control software that only runs on Windows XP? These are not uncommon risks. The devices themselves can’t be secured, but that doesn’t…


  • How to Comply with GDPR, PIPL and CCPA

    Compliance issues can be tricky, especially when there are so many data privacy laws. Find out how to comply with GDPR, PIPL, and CCPA.


Top Cybersecurity Companies

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis