Why robust KYC procedures are crucial for all SaaS companies [Q&A]

SaaS

For banks, know-your-customer (KYC) measures amount to 40 percent of all anti money laundering (AML) compliance costs, totaling $5.7 million each year. This sum is tiny, however, compared to what is paid for non-compliance. In 2022, global fines for inadequate AML grew by 50 percent, almost reaching $5 billion.

We spoke to Vaidotas Šedys, head of risk management at web intelligence platform Oxylabs, to discover that KYC-related challenges are not just faced by banks but are an issue for proxy and web scraping service providers too.

Continue reading

Data privacy requests surge since 2021

Data privacy

A new report shows 246 percent boost in privacy requests since 2021 as consumers seek to clear personal data online.

The report from DataGrail shows Data Subject Requests (DSRs) -- formal requests made to a company by a person to access, delete or request not to sell/share the personal data that the company holds on them -- increased by 32 percent from 2022 to 2023.

Continue reading

New solution helps enterprises demonstrate security and compliance

Compliance rule law and regulation graphic interface for business quality policy

As numbers and severity of third-party breaches grow, companies are scrutinizing not just how they handle data, but how their vendors do as well. Trust management platform Vanta is launching a new addition to its Trust Center to allow enterprises to automate security questionnaires

Questionnaire Automation in Trust Centers uses Vanta AI to save time by generating suggested responses for security teams to review and approve, rather than starting from scratch each time. This will make it easier for enterprises to proactively and reactively demonstrate their security and compliance.

Continue reading

Compliance failings leave enterprises vulnerable to data breaches

Compliance rule law and regulation graphic interface for business quality policy

A new report from Thales reveals that 43 percent of enterprises failed a compliance audit last year, with those companies 10 times more likely to suffer a data breach.

Based on a survey of almost 3,000 IT and security professionals it also finds that 93 percent of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47 percent last year.

Continue reading

Nearly half of enterprises face increased cost due to poor IT asset data

Asset management

Around half of organizations have experienced a significant increase in their audit budget expenditures due to poor IT asset inventory data.

Research carried out by YouGov for Oomnitza shows 56 percent of companies report that the data accuracy of their configuration management database (CMDB) is only 85 percent or less with insufficient levels of process automation.

Continue reading

How to prepare for the new PCI DSS 4.0 requirements [Q&A]

Contactless payment NFC

The Payment Card Industry Data Security Standard (PCI DSS) turns 20 next year and has remained largely unchanged during that time. But version 4.0, due to become mandatory from April 2024, will bring the standard bang up-to-date and usher in a number of big changes.

We spoke to Phil Robinson, principal consultant and QSA at Prism Infosec, to explore what's changing and how organizations can prepare to meet the new requirements.

Continue reading

What enterprises need to know about cybersecurity compliance [Q&A]

Compliance rule law and regulation graphic interface for business quality policy

Just as cybersecurity threats are constantly evolving, so are the compliance regulations that organizations must follow. And as these regulations tighten so the risks of non-compliance become higher.

Cam Roberson, VP at Beachhead Solutions, a provider of cloud-managed PC and mobile device encryption, security, and data access control, sat down with us to discuss what enterprises need to know about the current state of cybersecurity compliance.

Continue reading

Blancco partners with Lenovo to offer secure data erasure for enterprises

Sweep away data

Enterprises are dealing with ever greater volumes of data and that brings with it added risk as well as compliance issues and management costs.

In particular, it's important for security and compliance to be able to securely dispose of data that's no longer required. This is why data erasure specialist Blancco Technology Group is announcing a global collaboration with Lenovo to provide secure data erasure as part of the Lenovo ThinkShield security solution.

Continue reading

Mandatory protections, higher premiums and continued growth -- cyber insurance predictions for 2024

insurance key

The high costs, both financial and reputational, of dealing with a cyberattack along with tighter regulations that means attacks must be reported have meant that many more organizations are seeking to protect themselves with cyber insurance.

This is still a relatively new and developing field, so what do industry experts think we'll see in the cyber insurance market in 2024?

Continue reading

How AI can help app developers keep up with changing regulations [Q&A]

Compliance rule law and regulation graphic interface for business quality policy

A changing regulatory landscape can prove difficult for app developers as they need to make sure they remain compliant and keep up with evolving rule sets.

We spoke to Pedro Rodriguez, head of engineering at AI-powered compliance intelligence platform Checks, to find out how AI can help mobile app developers to handle data responsibly and keep up with ever-changing global regulations,

Continue reading

Out of control data puts compliance at risk

Corridor of  server room with server racks in datacenter. 3d ill

According to a new report, 66 percent of IT decision makers (ITDMs) are worried that data is spiraling out of control in their organization and that this is putting compliance at risk.

The study of 850 ITDMs carried out for Cloudera shows that 63 percent of organizations believe siloed data makes it harder for them to comply with data compliance regulations.

Continue reading

Enterprises struggle with a changing security and compliance landscape

business security

A new report from Vanta shows 67 percent of businesses say they need to improve security and compliance measures with 24 percent rating their organization's security and compliance strategy as reactive.

The expansion of attack surfaces in a post-pandemic hybrid world, combined with shrinking teams and budgets and the rapid rise of generative AI, are fueling an urgent need for companies to improve, and prove, their security posture.

Continue reading

OneSpan launches quantum-safe storage to secure digital agreements

Secure vault

Recent technology developments related to AI and the rise of quantum computing can put the integrity of digital agreements at risk, potentially leading to data loss, manipulation, identity or asset theft, and legal consequences for an organization.

For this reason OneSpan is launching a new Trust Vault feature for its e-signature solution that helps guarantee the integrity and long-term viability of documents using immutable storage based on blockchain technology.

Continue reading

Cyber insurers play harder to get as claims increase

insurance key

A new survey of over 300 organizations in the US finds that the time and effort to obtain cyber insurance is increasing significantly.

The survey, conducted by Censuswide on behalf of privileged access platform Delinea, looked to uncover new trends and evolving patterns since a similar report last year and finds that the numer of companies using their cyber insurance more than once increased to 47 percent.

Continue reading

Gaps in digital rights management pose serious risk

Risk dial

Serious gaps in digital rights management could expose private and public sector organizations to security and compliance risks.

A new 'Sensitive Content Communications Privacy and Compliance' report from Kiteworks finds many organizations lack unified tracking, control, and security of private data that is sent, shared, and transferred with third parties, which creates significant risk of unauthorized access, both malicious and accidental.

Continue reading

Load More Articles