Myth-Busting
Strategic Compliance:
Fact and Fiction

myth-busting-strategic-compliance

The most profound change that IT leaders need to make in their approach to strategic compliance is to their own mind. There are many self-imposed limiting beliefs that must be overcome.

Read More

Transforming Compliance to Enable Digital Transformation

transforming-compliance-digital-transformation

Business has been transformed from the PC and corporate networks to mobile devices and cloud computing. Digital transformation is readily available to every organization but requires cybersecurity and compliance.

Read More

The Apex of Strategic Compliance

apex-of-strategic-compliance

There is no denying that we have entered a new zeitgeist with strategic compliance. Organizations have been thrust into thinking about how to securely enable the productivity of a remote workforce.

Read More

Establishing a Center of Excellence with A-LIGN

strategic-compliance-center-of-excellence

TIBCO Software Inc., a global leader in enterprise data, empowers its customers to connect, unify and confidently predict business outcomes, solving the world’s most complex data-driven challenges.

Read More

Achieving GLBA Compliance for Data Protection

GLBA Compliance Blog A-LIGN

What is the Gramm-Leach-Bliley Act of 1999 (GLBA)? The Gramm-Leach-Bliley Act of 1999 (GLBA), also known as the Financial Services Modernization Act of 1999, requires that organizations protect the privacy of consumer financial information.

Read More

FTV Capital Leads $54.5 Million Growth Equity Investment in Cybersecurity and Compliance Solutions Leader A-LIGN

FTV Capital Growth Equity Investment A-LIGN

As Cyber Risk Grows, A-LIGN Helps Businesses Meet Regulatory, Compliance and Data Privacy Mandates

Read More

The Uber Security Breach: 3 Takeaways to Secure Your Organization

uber-breach

In October 2016, Uber the global car sharing company, experienced a massive breach whereby hackers stole personal data from approximately 57 million users and drivers. After a year of concealment without regulatory notice and payment to the hackers to destroy the data, Uber finally disclosed the breach. As a result, Uber has undertaken a large […]

Read More

Inside DEF CON 25

inside-defcon

What is DEF CON? DEF CON is an annual global hacking conference which brings together the brightest minds in information and it covers a variety of topics such as SMB replay attacks, web packet manipulation, and deauthentication attacks on wireless access points. This conference, now in its 25th year in existence, is an opportunity for […]

Read More

Choosing the Right Security Applications for Your Organization

security-applications

There are various methods to protect your computer from malware and other malicious attacks. Identifying the hardware, techniques, and software that work best for your organization is essential to having a system that can manage your entire business environment. Failing to do so can be risky: per a survey done by Ponemon Institute, the average cost […]

Read More

Phishing 201: What are the Different Types of Phishing Attacks?

In our initial blog, Phishing 101, we covered the basics of phishing, including what phishing is and how to prevent it. Today, we will cover the different types of phishing attacks that your organization could be vulnerable to. Types of Phishing Deceptive phishing Deceptive phishing is the most common type of phishing scam. These scams occur […]

Read More