April 13, 2017
The government needs a better definition for an act of cyberwarfare, says ex-CIA Director Michael Hayden, because he doesn't think the U.S. election hacking applies.
March 10, 2017
The otherwise obscure topic of taxation for the self-employed hit the headlines this week after chancellor of the exchequer Philip Hammond announced in his latest Budget a rise in national ...
February 24, 2017
Experts say codifying the Vulnerability Equities Process into law would increase transparency and trust regarding vulnerability disclosure by the government.
February 15, 2017
In a panel discussion about current IoT security risks, experts at RSA Conference 2017 weigh government legislation options against industry self-regulation.
Legislation Get Started
Bring yourself up to speed with our introductory content
Calls are growing louder for information security regulations to target consumer-centric technology such as the IoT and drones, but legislating their use could prove difficult. Continue Reading
Pitching your services to a law firm's IT committee can be challenging, but there are ways to get your message across, according to Andrew Harrover of Matrix Computer Consulting. Continue Reading
Emails often contain sensitive information, yet the proper measures are not always taken to secure them. Learn how to keep corporate email safe both at home and in foreign countries. Continue Reading
Evaluate Legislation Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Continued calls for deregulation may sound like death knell for information governance, but IG investments may prove to be more vital than ever to businesses in 2017 and beyond. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the controversial Rule 41 changes and what they mean for law federal enforcement and cybersecurity practices. Continue Reading
A proposed rule is designed to protect consumers from unfair payday lending practices, but legal challenges to the regulation are on the horizon. Continue Reading
Learn to apply best practices and optimize your operations.
You can't hang a "Do not disturb" sign on a mobile device. But users want their privacy when it comes to working on smartphones and tablets. IT must figure out how to balance their personal privacy with the ability to secure corporate apps and data on those devices. In this month's cover story, editor in chief Colin Steele dives into the issue of privacy in the mobile age.
For the strongest mobile security, IT shops should take a layered approach, says columnist Eric Klein this month. Another column looks at why IT should make data storage and processing a priority in their mobility strategy. Plus, one of the newest ways to deliver and manage mobile resources is through workspaces -- an emerging technology that Jack Madden explains in depth. Finally, we recap the Best of Citrix Synergy Awards winners from this year's conference.Continue Reading
The Canadian anti-spam legislation applies to many enterprises. Expert Mike Chapple explains what the effects of CASL are for businesses. Continue Reading
To promote accountability, some SEC settlements now require admission of guilt. In this FAQ, learn what prompted the change and why some oppose it. Continue Reading
Problem Solve Legislation Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Reporting ransomware attacks to law enforcement can pose potential risks to the targeted organization. Expert Mike O. Villegas discusses the key aspects of disclosing an attack. Continue Reading
FITARA became a law in 2014, but government cybersecurity continues to struggle. Expert Mike O. Villegas discusses the effects of the law. Continue Reading