The Ultimate Guide to Compliance
2024 edition
Overview
Where there are regulations, there must be compliance. Regulatory regimes exist for good reason, ensuring minimum standards and providing guidance on good operating practices. While some regulations have broad applicability – like the EU’s Generalised Data Protection Regulations (GDPR), others are narrower and apply to specific vertical industries, such as banking’s Sarbanes-Oxley or Anti Money Laundering provisions. Compliance is eased through an active software development industry providing tools that help organisations fulfil and report their obligations under the law.
Analyst reports
Forrester Wave on Cybersecurity
Confluent Cloud achieves 'Protected' level under Aussie...
Last week
IDC on AI
New Relic releases Live Archives for enhanced log reten...
Last month
IDC on DevOps
DigiCert reveals widening gap in digital trust manageme...
Last month
KuppingerCole on SaaS
Delinea set to acquire Fastpath, revolutionising privil...
Last month
Gartner Peer Insights on CX
Basware unveils global expansion plans after bookings s...
Last month
Expert columns
By Brett Chase, of Cohesity
The imperative to go beyond backup, by focusing on cybe...
2 days ago
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
5 days ago
By Tony Howell of archTIS
Unlocking the complexity of managing classified data at...
5 days ago
By Jason Porter of T4 Group
Maximising business data: choosing the right Data Centr...
Last week
By Janine Grainger of Easy Crypto
Easy crypto on Crypto taxes: Ignorance is never bliss!
Last week
More expert columns
By George Moawad of Genetec
Unification for better efficiency, flexibility, and so ...
Last week
By George Moawad of Genetec
Ensuring security without compromising privacy
This month
By Lisa Tetrault of Arctic Wolf
IWD 2024: Cybersecurity is stronger with diversity
This month
By Katherine Robins of IBM
IWD 2024: Emerging threats mean the cyber security indu...
This month
By Mani Keerthi Nagothu of SentinelOne
IWD 2024: The qualities that make women shine as CISOs
This month
By Tim Davoren of Logicalis Australia
Customer-centric cybersecurity incident response vital ...
Last month
Top players
You can read more from the top players RSA Security, Accenture, Orchestra, Palo Alto Networks, and Microsoft.
Recent news
About Passwords
Legit Security launches AI solution to manage app secur...
Yesterday
About Transparency
BABL AI and QuantPi unite for robust AI governance
3 days ago
About Software-as-a-Service
Portnox unveils Conditional Access for Applications to ...
3 days ago
About Ransomware
ICS partners with e2e-assure to enhance cyber security ...
3 days ago
About Privacy
CCL unveils Copilot readiness workshop for Microsoft 36...
4 days ago
More expert columns
By Tim Davoren of Logicalis Australia
Customer-centric cybersecurity incident response vital ...
Last month
By Jonathan Beeby of SAP Concur Australia and New Zealand
Opportunities to improve travel and expense processes f...
Last month
By Peter Ibarra of Amperity
Preparing for the Cookieless Era: Key Tips from Amperit...
Last month
By Theo Hourmouzis of Snowflake
Addressing the 4 key challenges of designing a data and...
Last month
By Max Howells of Nintex
Understanding the importance of risk management in proj...
Wed, 13th Dec 2023
By Scott Hesford of BeyondTrust
Aussie firms must contextualize rising cyber incident d...
Wed, 6th Dec 2023
Even more expert columns
By Scott Hesford of BeyondTrust
Aussie firms must contextualize rising cyber incident d...
Wed, 6th Dec 2023
By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Thu, 30th Nov 2023
By Pieter Danhieux of Secure Code Warrior
The benefits (and risks) of using AI for code developme...
Tue, 28th Nov 2023
By Thomas Fikentscher of CyberArk
Predictions for the cybersecurity industry in 2024
Tue, 28th Nov 2023
By Andrew Borthwick of Orange Business
Fortifying business defences through crucial cybersecur...
Fri, 24th Nov 2023
By Leon Poggioli of Claroty
Cybersecurity can be a source of competitive advantage ...
Fri, 24th Nov 2023
By Chris Johnson of Nokia
Why enterprises and governments should prepare for Q-Da...
Fri, 24th Nov 2023
By Richard Sorosina of Qualys
Qualys on cybersecurity predictions for 2024
Thu, 23rd Nov 2023
By Jonathan Beeby of SAP Concur Australia and New Zealand
How organisations can reduce security and compliance ri...
Wed, 22nd Nov 2023
By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
Mon, 6th Nov 2023
More news
About Cloud Security
Tufin launches enhanced security policy management suit...
4 days ago
About Multi-cloud
Venafi enhances Firefly with SPIFFE for improved worklo...
4 days ago
About Software Updates
Puppet's 2024 report highlights security benefits of pl...
4 days ago
About Cryptocurrency
Ripple hosts Australia policy summit on blockchain regu...
Last week
About Transparency
Sonatype launches new SBOM Manager at KubeCon Europe
Last week
Even more news
About Collaboration
Bedford Blues partner with Crowd Angel to boost fan saf...
Last week
About Productivity
ControlUp unveils Secure DX designed for endpoint devic...
Last week
About Productivity
LeapXpert reveals Maxen, a GenAI app to boost client co...
Last week
About Transactions
SAP Concur & Mastercard unite for streamlined expense p...
Last week
About Identity Theft
Heng Leong Hang adopts CyberArk platform for enhanced c...
Last week
Job moves
Move at Chief Technology Officer
Encompass appoints Neil Acworth as new Chief Informatio...
4 days ago
Move at Business Systems Ltd
Business Systems Ltd welcomes new CEO, Mike Wardell
This month
Move at Acronis
Acronis appoints Kelly Johnson as General Manager for A...
Last month
Move at Hutly
Hutly tech firm appoints industry veteran John Natsioul...
Last month
Move at Deloitte
Kylie Watson becomes DXC Technology's Head of Security ...
Last month
Other guides
You can read other related guides from Cybersecurity, Cloud Services, Artificial Intelligence, Big Data, and Business Intelligence.
Powered by