Compliance and Regulations

Articles, news, and research on cybersecurity compliance and regulations.

Compliance and Regulations

Compliance and Regulations

What is the EU Cyber Solidarity Act?

Explore the latest legislation in the EU for improving cyber resilience and incident response.
Read more
Compliance and Regulations

What is the Tennessee Information Protection Act (TIPA)?

Learn more about the Tennessee Information Privacy Act (TIPA) and discover the obligations the privacy law imposes on data controllers and processors.
Read more
Compliance and Regulations

What is the Montana Consumer Data Privacy Act (MTCDPA)?

Learn more about the Montana Consumer Data Privacy Act and uncover the obligations it imposes on data controllers and processors.
Read more
Compliance and Regulations

Preparing for NIS2: A Compliance Guide For Covered Entities

The EU's latest cybersecurity directive includes an expanded scope and obligations. Learn more about NIS2 in this informative guide.
Read more
Compliance and Regulations

Australia's Privacy Act Reforms: Enhanced Data Privacy for All

Australia's landmark privacy regulation is undergoing significant reforms. Learn about upcoming changes and how to best prepare for compliance.
Read more
Compliance and Regulations

Advanced GDPR Compliance Strategies for Cybersecurity

A list of little-known GDPR compliance strategies that you may not have yet considered. A helpful resource for those struggling with GDPR compliance.
Read more
Compliance and Regulations

Cross-Border Data Flow: The EU-US Privacy Shield's Demise

Explore the EU-US Privacy Shield, including the challenges leading to its invalidation, and updated transatlantic data privacy laws for the EU and US.
Read more
Compliance and Regulations

The NIST AI Risk Management Framework: Building Trust in AI

Learn about the newest NIST framework that aims to help businesses implement trustworthy AI systems.
Read more
Compliance and Regulations

Meeting Third-Party Risk Requirements of DORA in 2024

Learn how to achieve compliance with the third-party risk management standards of the Digital Operational Resilience Act (DORA)
Read more
Compliance and Regulations

The EU Cyber Resilience Act: Securing Digital Products

Learn about the new EU cyber legislation that aims to secure digital products and services.
Read more
Compliance and Regulations

Deciphering CUI: What is Controlled Unclassified Information?

Learn more about CUI and discover the steps your organization can take to protect its controlled unclassified information and achieve CMMC certification.
Read more
Compliance and Regulations

What's New in NIST CSF 2.0: The Top 4 Changes

A summary of the four most impactful changes in NIST CSF 2.0. If you're a cybersecurity professional you will love this new improved framework.
Read more
Compliance and Regulations

What is the Health Records and Information Privacy Act 2002 (HRIPA)?

Learn about HRIPA, the leading health information handling regulation in New South Wales, Australia.
Read more
Compliance and Regulations

What is the EU Artificial Intelligence Act?

Learn about this new landmark regulation regarding the concerns and regulation of AI technology.
Read more
Compliance and Regulations

The Digital Markets Act: Reshaping Tech Competition in the EU

Explore how the Digital Markets Act regulates major technology companies to promote a free and fair digital economy across the European Union.
Read more
Compliance and Regulations

Cybersecurity for the Cayman Islands Monetary Authority (CIMA)

Find out how the Cayman Islands Monetary Authority (CIMA) approaches cybersecurity and the regulations for its financial institutions.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.