Compliance

Featured Post

Using Technology to Keep Compliance Costs Down

Regulatory compliance is overwhelming for any company without the right tools. Think of multinational financial firms that have to comply with laws in multiple jurisdictions where they operate. Thus, as various governments continue to implement programs to lower regulatory burdens on businesses, company leaders know there's a need to cut down on regulatory compliance costs. Luckily, technology can help cut compliance expenses without cutting regulations-related oversights and protection.
puppet

Applying the Roles and Profiles Method to Compliance Code

Most of you are familiar with the roles and profiles method of writing and classifying Puppet code. However, the roles and profiles method doesn’t have to exist only in your control repository. In fact, as I’ve been developing Puppet code centered around compliance, I’ve found that adapting the roles and profiles method into a design pattern to Puppet modules makes the code more auditable, reusable, and maintainable!

What You'll Find at the Crossroads of Digital Transformation and Compliance

What do risk and compliance functions risk by deferring digital transformation? How can risk and compliance functions jumpstart an organization's digital transformation? Why does intelligent information management underpin the compliance function AND digital transformation at the same time? These and more questions answered in this podcast featuring special guests Alexis Evangelou from Iron Mountain Cyprus and Vanessa Miller of VM Consulting.
calligo

Calligo acquires US-based Decisive Data to accelerate Data Insights Services

Today, Calligo announces the acquisition of Decisive Data, a pioneer in data analytics, data science and visualization. This is a significant acquisition for Calligo as it not only increases the resources and capabilities of our Data Insights team, but it also creates the most capable, accessible and compliant data insights service for modern businesses.

puppet

Security vs. Compliance: What's the difference?

The first two posts in our compliance blog series focused on managing compliance through automation. In this third post, we take a step back to explore a more foundational — but no less important — topic: What’s the difference between compliance and security? Is compliant infrastructure secure infrastructure? People often talk about compliance and security as though they’re one and the same.

calligo

Could your IT managed service provider sign this? Have you even asked?

Our IT managed services team talks to dozens of new businesses every month, and they have noticed a new trend emerging. Over the last six months or so, more and more businesses are – without prompt – enquiring about our ability to keep their data safe. This is subtly and importantly different from our ability to provide managed security services. Or to protect their data from internal and external threats.

calligo

Calligo wins twice at the Digital Jersey Tech Awards

2021 is off to a stellar start for Calligo. At the Digital Jersey Tech Awards 2020 virtual awards evening, Calligo was announced as the Digital Growth Business of the Year for its achievements throughout last year, while Julian Box was named the Digital Leader of the Year. Calligo was named Digital Growth Business of the Year because of its growth in five key areas: UK expansion A fourth acquisition was also completed in 2020, this time in the UK.

logsentinel

The Importance Of Security Logs For GDPR Compliance

GDPR enforcement (and therefore fines) has been on the rise recently. And after the initial “compliance on paper” that many consultants offered, it’s time to address the cybersecurity aspects underlying GDPR. We have previously addressed the logging requirements of GDPR and now we are going to review the “why” in addition to the “what”.

logsentinel

Using SIEM for Regulatory Compliance: Importance, Best Practices, Use Cases

Why is SIEM Important for Regulatory Compliance? A security information and event management (SIEM) system can improve the security of your business’ computer network with real-time automation, monitoring, logging and event alerts. By leveraging SIEM Software, your security team is able to track events concerning your company’s information security, such as potential data breaches, helping you to react in a timely manner.