Posts by A-LIGN
06.04.2020
Myth-Busting
Strategic Compliance:
Fact and Fiction

The most profound change that IT leaders need to make in their approach to strategic compliance is to their own mind. There are many self-imposed limiting beliefs that must be overcome.
Read More05.19.2020
Transforming Compliance to Enable Digital Transformation

Business has been transformed from the PC and corporate networks to mobile devices and cloud computing. Digital transformation is readily available to every organization but requires cybersecurity and compliance.
Read More05.07.2020
The Apex of Strategic Compliance

There is no denying that we have entered a new zeitgeist with strategic compliance. Organizations have been thrust into thinking about how to securely enable the productivity of a remote workforce.
Read More05.06.2020
Establishing a Center of Excellence with A-LIGN

TIBCO Software Inc., a global leader in enterprise data, empowers its customers to connect, unify and confidently predict business outcomes, solving the world’s most complex data-driven challenges.
Read More07.24.2018
Achieving GLBA Compliance for Data Protection

What is the Gramm-Leach-Bliley Act of 1999 (GLBA)? The Gramm-Leach-Bliley Act of 1999 (GLBA), also known as the Financial Services Modernization Act of 1999, requires that organizations protect the privacy of consumer financial information.
Read More07.16.2018
FTV Capital Leads $54.5 Million Growth Equity Investment in Cybersecurity and Compliance Solutions Leader A-LIGN

As Cyber Risk Grows, A-LIGN Helps Businesses Meet Regulatory, Compliance and Data Privacy Mandates
Read More11.30.2017
The Uber Security Breach: 3 Takeaways to Secure Your Organization

In October 2016, Uber the global car sharing company, experienced a massive breach whereby hackers stole personal data from approximately 57 million users and drivers. After a year of concealment without regulatory notice and payment to the hackers to destroy the data, Uber finally disclosed the breach. As a result, Uber has undertaken a large […]
Read More08.29.2017
Inside DEF CON 25

What is DEF CON? DEF CON is an annual global hacking conference which brings together the brightest minds in information and it covers a variety of topics such as SMB replay attacks, web packet manipulation, and deauthentication attacks on wireless access points. This conference, now in its 25th year in existence, is an opportunity for […]
Read More06.30.2017
Choosing the Right Security Applications for Your Organization

There are various methods to protect your computer from malware and other malicious attacks. Identifying the hardware, techniques, and software that work best for your organization is essential to having a system that can manage your entire business environment. Failing to do so can be risky: per a survey done by Ponemon Institute, the average cost […]
Read More01.27.2017
Phishing 201: What are the Different Types of Phishing Attacks?
In our initial blog, Phishing 101, we covered the basics of phishing, including what phishing is and how to prevent it. Today, we will cover the different types of phishing attacks that your organization could be vulnerable to. Types of Phishing Deceptive phishing Deceptive phishing is the most common type of phishing scam. These scams occur […]
Read More