Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

Synthetic Identity Fraud : How AML/CFT compliance can help in building brand trust

Identity fraud has been a significant threat to businesses. Industries related to finance and financial institutes, tourism, and hospitality are the most affected by this. Although scammers use various methods and tricks for identity theft, synthetic identity is a major concern and is a popular trend amongst fraudsters. Synthetic Identity Theft is a complex form of theft in which the person’s identity is imitated.

Meet the Trust Champions that Led BigSpring's SOC 2 Process

What is a Trust Champion? A Trust Champion is the person who helps their organization measure and meet its internal compliance obligations. Their actions support revenue-generating activities, protect their organization from legal and contractual liabilities, and enable the organization to confidently and transparently showcase an intentional, robust, and differentiated culture of trust. Arun Nagarajan – Co-founder & CTO – has led the compliance journey at BigSpring.

New In TrustOps: Evidence Automation with Smart Inventories

You want as much of your compliance program automated as possible, and collecting evidence to validate compliance controls always seems to take a lot of your team’s time. A considerable amount of control evidence involves providing accurate lists of artifacts to auditors — whether it’s workstations, tickets, alerts, or people. If only there were an easier way than having your teammates take screenshots and export lists from each of your internal systems.

3 Steps to Secure and Compliant Data Sharing

Every day, organizations subject themselves to audit violations and data leaks when their end-users share sensitive data with third parties – essentially anyone outside of your organization. Various regulations and compliance frameworks require sensitive data to be encrypted with industry-grade security while at rest and in transit.

How intelligent are AI tea-making robots?

When it comes to how truly intelligent Artificial Intelligence (AI) is, it’s a polarizing debate. Either AI will solve the world’s woes or robots will rule us all – Matrix-style. But it’s all a little more complicated than Hollywood makes it seem… For a deep dive, do listen to our Beyond the Data podcast hosted by Sophie Chase-Borthwick (Calligo’s Global Data & Governance Lead) and Tessa Jones (VP of Data Science Research & Development).

Meeting the Third-Party Risk Requirements of the CCPA in 2022

Often regarded as the Californian version of the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) aim’s to increase consumer rights by giving California residents greater control over the use of their personal data. The CCPA heavily regulates the use of any data that could potentially link to the identity of a consumer or household, either directly or indirectly.

Meeting the 3rd-Party Risk Requirements of The NY SHIELD Act

The Stop Hacks and Improve Electronic Data Security (SHIELD) Act is designed to protect the personal data of all New York residents. This act broadens the data privacy and protection standards stipulated in the Gramm-Leach-Bliley Act (GLBA) and the New York Department of Financial Services (NYDFS). What makes this particular data protection law unique is its inclusion of biometric information, usernames, and passwords in the category of personal information.

CCPA Compliance Vs CPRA Compliance

The California Consumer Privacy Act (CCPA) is a law that was signed on June 28, 2018, that established and promoted the consumer privacy rights and business obligations concerning the collection and sales of personal information of citizens of California. The CCPA came into effect on January 1st, 2020. Soon after in November 2020, Proposition 24, known as the California Privacy Rights Act of 2020 (CPRA) was introduced which is soon to replace the CCPA Compliance.

Interview With CMMC Provisional Assessor, Tony Giles

For our latest specialist interview in our series speaking to security leaders from around the world, we’ve welcomed Tony Giles, Lead Auditor and CMMC Provisional Assessor with the NSF. Tony has conducted audits globally for over 10 years and worked on large-scale security implementation projects, including NIST 800-171, NIST 800-88 and ISO/IEC 27001, ISO 28000.