One Article Review

Accueil - L'article:
Source CSO.webp CSO
Identifiant 779670
Date de publication 2018-08-17 08:40:00 (vue: 2018-08-18 20:01:14)
Titre IDG Contributor Network: Balancing cybersecurity and regulatory compliance
Texte Rigorous regulations like GDPR and California's Consumer Privacy Act will only become more prevalent, as long as our current cybersecurity landscape continues to suffer the near-crippling data breach affliction. Attackers seem to be one step ahead of defenders, constantly changing their attack vectors as new technologies become available, such as artificial intelligence and automated bots. But is coming up with new laws protecting or hindering our progress?Regulatory compliance over cybersecurity As witnessed overseas, many companies are struggling to stay compliant with standards like GDPR, and are more focused on meeting the minimum requirement rather than proper security policies, which hackers can easily find weaknesses in. The result of regulatory requirements is that they become outdated fairly quickly in the cyber world. What's worse, regulation outlines that are made publicly available essentially provide hackers a roadmap to breaking through defenses. By the time governing bodies overseeing these standards implement measures to fix these vulnerabilities, it' already too late. Businesses are exhausting time, manpower and capital on regulatory compliance that is inherently vulnerable, rather than fool-proof defenses that will protect all stakeholders.
Envoyé Oui
Condensat act affliction ahead all already are article artificial attack attackers automated available balancing become bodies bots breach breaking businesses but california can capital changing click coming companies compliance compliant constantly consumer continues contributor crippling current cyber cybersecurity data defenders defenses easily essentially exhausting fairly find fix focused fool full gdpr governing hackers here hindering idg implement inherently intelligence landscape late laws like long made manpower many measures meeting minimum more near network: new one only outdated outlines over overseas overseeing please policies prevalent privacy progress proof proper protect protecting provide publicly quickly rather read regulation regulations regulatory requirement requirements result rigorous roadmap security seem stakeholders standards stay step struggling such suffer technologies than these through time too vectors vulnerabilities vulnerable weaknesses what which will witnessed world worse
Tags Data Breach
Stories
Notes ★★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: