What Is ITAR Compliance? Regulations, Penalties & More
The International Traffic in Arms Regulations (ITAR) controls the sale, manufacture, import, and export of defense-related services, articles, and technical data on the United States Munitions List (USML).
ITAR is a set of US regulations overseen and administered by the State Department designed to protect the national security interests of the United States. ITAR applies to defense companies that handle military and defense-related information, including universities and research centers.
What is India's Digital Personal Data Protection (DPDP) Act? Rights, Responsibilities & Everything You Need to Know
We provide a high-level overview of India's Digital Personal Data Protection Act or DPDP Act, including how data privacy law in India has evolved over the years and outline the rights and responsibilities of the recently passed bill.
What Is Code Encryption and How Does It Work?
What is code encryption? In this blog we describe the benefits of code encryption, how it differs from code obfuscation, and how it relates to data loss prevention.
Friday Five: DOJ Launches new Cybercrime Unit, Regulating AI, and Consolidating Cybersecurity Tools
DOJ ESTABLISHES CYBERCRIME ENFORCEMENT UNIT AS U.S. WARNINGS MOUNT OVER CHINESE HACKING BY AJ VICENS
Friday Five: FCC Cracks Down on Privacy, a Massive Phishing Campaign, & More
This past week, the FCC announced the launching of a data privacy task force, CISA issued a new directive and a separate LockBit advisory, and a massive phishing campaign was uncovered. Catch up on the latest in this week’s Friday Five!
What Is XACML & How Does It Work?
Enterprises face increasingly sophisticated attacks, like advanced persistent threats, from well-financed organized crime syndicates and rogue nation-states. To further compound matters, the prevalence of insider threats has heightened the need to enforce security so that only the right people can access the right resources.
XACML has emerged as a robust identity and entitlement management for enterprises at scale.
Healthcare Data Security: Challenges & Solutions
The sanctity of patient/doctor confidentiality in the digital age requires strict security measures to safeguard healthcare data. This requires balancing data protection and privacy with a low-friction, privileged access environment that prevents unauthorized access to patient records.
What To Look for in a HIPAA-Compliant Email Provider
Whether you work for a doctor's office, healthcare organization, or just find yourself handling protected health information or ePHI, this blog breaks down what to look for in a HIPAA-compliant email service provider.
Friday Five: Critical Infrastructure at Risk, the New DBIR, and the Rising Sextortion Threat
Verizon's latest Data Breach Investigations Report (DBIR) was released this past week, but it shared the headlines with malware attacking Minecraft users, an FBI alert of rising sextortion attacks, and more. Catch up on all these stories and more in this week’s Friday Five!
What is ITAR Compliance? (Regulations, Fines, & More)
Learn about ITAR compliance in Data Protection 101, our series on the fundamentals of information security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!