Compliance and Regulations
What is the SHIELD Act? Tips for SHIELD Compliance
The SHIELD Act was enacted on July 25, 2019 as an amendment to the New York State Information Security Breach and Notification Act.
Read more
What is the NYDFS Cybersecurity Regulation? (23 NYCRR 500)
23 NYCRR 500 is a set of regulations from the NYDFS that places cybersecurity requirements on all financial institutions and financial services companies.
Read more
What is SOX Compliance? 2024 Requirements, Controls and More
This is a complete overview of SOX Compliance. Learn how to ensure your organization is compliant with the SOX Act in this in-depth post.
Read more
Top 11 Questionnaires for IT Vendor Assessment in 2024
This is a complete overview of the top 11 questionnaires for IT vendor assessment. Learn which security questionnaire is right for you in this in post.
Read more
APRA CPS 234: Information Security Prudential Standard
The APRA CPS 234 prudential standard aims to ensure that regulated Australian entities can protect themselves from cybercrime and security incidents.
Read more
Best Practices for Cybersecurity Compliance Monitoring
This is a complete overview of compliance monitoring best practices. Learn why compliance monitoring is required for many industries in this in-depth post.
Read more
What is Sensitive Data?
Sensitive data is information that must be protected against unauthorized access.
Read more
What is FISMA? FISMA Compliance Requirements
FISMA is a United States federal law that defines a comprehensive framework to protect government information, operations, and assets against threats.
Read more
What is the LGPD? Brazil's General Data Protection Law
The Brazilian General Data Protection Law (Lei Geral de Proteção de Dados Pessoais or LGPD) is a law that was passed by the National Congress of Brazil.
Read more
The Most Important Security Metrics to Maintain Compliance
This is a complete overview of security metrics. Learn how to use security metrics to maintain compliance with regulations in this in-depth post.
Read more
What is NIST SP 800-171? Tips for NIST SP 800-171 Compliance
This is a complete guide to NIST SP 800-171. Learn how to comply with NIST SP 800-171 with this in-depth post.
Read more
Summary of the HIPAA Privacy Rule (Includes Compliance Tips)
This is a complete overview of the HIPAA Privacy Rule. Learn about what the Privacy Rule is and what you need to do to comply in this in-depth post.
Read more
What is the Cost of a Data Breach in 2023?
Learn about the global costs of a data breach and how to implement the right defenses to protect your business.
Read more
What is Protected Health Information (PHI)?
Protected health information (PHI) is any information about health status, provision of health care or payment for health care that is created or collected
Read more
How to Comply With CPS 234 (Updated for 2024)
This is a complete overview of how to comply with Prudential Standard CPS 234. Learn about the key requirements and how to meet them in this in-depth post.
Read more
What is SOC 2?
Service Organization Control 2 (SOC 2) is an auditing standard developed by the American Institute of Certified Public Accountants (AICPA).
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Book a free demo
Book a free, personalized onboarding call with one of our cybersecurity experts.