https://www.csoonline.com/article/3822701/jeder-funfte-ciso-vertuscht-compliance-probleme.html
Jeder fünfte CISO vertuscht Compliance-Probleme | CSO Online
Feb 12, 2025 - Laut einer aktuellen Studie werden nicht wenige Sicherheitsentscheider von C-Level-Kollegen und Vorständen dazu gedrängt, Compliance-Probleme nicht zu melden.
probleme csojedercisoonline
https://www.csoonline.com/article/570241/hipaa-explained-definition-compliance-and-violations.html
What is HIPAA? Definition, compliance, and violations | CSO Online
Jan 25, 2021 - HIPAA (the Health Insurance Portability and Accountability Act) is a law passed in 1996 that imposes stringent privacy and security mandates on health care...
violations csohipaadefinition
https://www.itnews.com.au/feature/cyber-compliance-often-overlooks-third-party-risks-warns-identifly-cso-620557
Cyber compliance often overlooks third-party risks, warns Identifly CSO - iTnews
cyber compliancethird party
https://www.csoonline.com/article/4012147/third-party-risk-management-how-to-avoid-compliance-disaster.html
Third-party risk management: How to avoid compliance disaster | CSO Online
Jul 3, 2025 - If third-party providers violate regulations, they expose their clients to a compliance risk. Third-party risk management (TPRM) is intended to help against...
third party riskmanagementcso
https://www.csoonline.com/article/4088198/beyond-the-checklist-shifting-from-compliance-frameworks-to-real-time-risk-assessments.html
Beyond the checklist: Shifting from compliance frameworks to real-time risk assessments | CSO Online
Nov 12, 2025 - Combine structured frameworks with a customizable assessment model to turn strategic fog into prioritized remediation plans with the most value.
compliance frameworksbeyond
https://www.csoonline.com/article/570125/glba-explained-what-the-graham-leach-bailey-act-means-for-privacy-and-it-security.html
GLBA explained: Definition, requirements, and compliance | CSO Online
Dec 17, 2020 - The Graham-Leach-Bailey Act (GLBA) is a 1999 law that allowed financial services companies to offer both commercial and investment banking, something that had...
explained definitionglbacso
https://www.csoonline.com/article/3496124/cloud-security-journey-wie-compliance-bei-accenture-geht.html
Cloud-Security-Journey: Wie Compliance bei Accenture geht | CSO Online
Dec 11, 2024 - Security war für die Entwickler bei Accenture lange eher ein Hindernis. Das hat sich dank eines neuen Compliance-Ansatzes grundlegend geändert.
cloud securitywie compliance
https://www.csoonline.com/article/4069285/salesforce-ai-agents-set-to-assist-enterprises-with-security-and-compliance.html
Salesforce AI agents set to assist enterprises with security and compliance | CSO Online
Oct 8, 2025 - Salesforce has been adding new features and capabilities since the launch of its AI agent platform a year ago at a furious pace. Today, Salesforce added two...
ai agentssalesforcesetassist
https://www.csoonline.com/article/569591/pci-dss-explained-requirements-fines-and-steps-to-compliance.html
PCI DSS defined: Requirements, fines, and steps to compliance | CSO Online
Apr 28, 2025 - PCI DSS (Payment Card Industry Data Security Standard) is a cybersecurity standard backed by all the major credit card and payment processing companies that...
pci dsscompliance csodefined
https://www.csoonline.com/article/4116135/ransomware-banden-erpressen-opfer-mit-compliance-verstosen.html
Ransomware-Banden erpressen Opfer mit Compliance-Verstößen | CSO Online
Jan 13, 2026 - Ransomware-Akteure haben es jetzt nicht mehr nur auf Daten abgesehen, sondern zunehmend auch auf Compliance-Lücken.
ransomware bandencso online
https://www.csoonline.com/video/508784/aligning-security-compliance-and-privacy-across-inventory-tracking.html
Aligning security, compliance and privacy across inventory tracking | CSO Online
security compliancecso online
https://www.csoonline.com/article/4025731/empathie-trifft-it-sicherheit-der-weg-zu-gelebter-compliance.html
Empathie trifft IT-Sicherheit: Der Weg zu gelebter Compliance | CSO Online
Nov 16, 2025 - Anwender sehen IT-Sicherheitsrichtlinien oft als hinderlich. Empathisches Policy-Engineering hilft CISOs, Akzeptanz zu fördern und Sicherheit wirksam...
der weg zuempathie trifftcso
https://www.csoonline.com/article/4116976/ransomware-gangs-blackmail-victims-with-compliance-violations.html
Ransomware gangs extort victims by citing compliance violations | CSO Online
Jan 15, 2026 - Ransomware actors are now targeting not only data, but increasingly also compliance gaps.
ransomware gangscso online