Compliance and Regulations
Top 8 Australian Cybersecurity Frameworks (Updated 2025)
We've compiled 10 of the best cybersecurity frameworks to protect Australian businesses from cyberattacks.
Read more
10-Step Checklist: GDPR Compliance Guide
GDPR compliance is mandatory but few organizations know how to align with its tenants. In this post, we break down the framework in 10 steps.
Read more
What is HITECH Compliance?
This is a complete overview of HITECH Compliance. Learn how to ensure your organization is compliant with the HITECH Act in this in-depth post.
Read more
What is the Gramm-Leach-Bliley Act (GLBA)?
The Gramm-Leach-Bliley Act (GLBA) is a United States federal law requiring financial institutions to explain how they share and protect customer data.
Read more
What is NIST SP 800-53? Includes Compliance Tips
NIST Special Publication 800-53 establishes an information security standard for the federal government.
Read more
What is PIPEDA (Personal Information Protection and Electronic Documents Act)?
The Personal Information Protection and Electronic Documents Act (PIPEDA) is the federal privacy legislation for private-sector organizations in Canada.
Read more
What is SOC 2?
Service Organization Control 2 (SOC 2) is an auditing standard developed by the American Institute of Certified Public Accountants (AICPA).
Read more
How to Comply With CPS 234 (Updated for 2025)
This is a complete overview of how to comply with Prudential Standard CPS 234. Learn about the key requirements and how to meet them in this in-depth post.
Read more
What is Protected Health Information (PHI)?
Protected health information (PHI) is any information about health status, provision of health care or payment for health care that is created or collected
Read more
What is the Cost of a Data Breach in 2023?
Learn about the global costs of a data breach and how to implement the right defenses to protect your business.
Read more
Summary of the HIPAA Privacy Rule (Includes Compliance Tips)
This is a complete overview of the HIPAA Privacy Rule. Learn about what the Privacy Rule is and what you need to do to comply in this in-depth post.
Read more
Understanding NIST SP 800-171 Compliance
Learn about NIST SP 800-171 compliance, key requirements, and steps for implementation to protect Controlled Unclassified Information (CUI) effectively.
Read more
The Most Important Security Metrics to Maintain Compliance
This is a complete overview of security metrics. Learn how to use security metrics to maintain compliance with regulations in this in-depth post.
Read more
What is the LGPD? Brazil's General Data Protection Law
The Brazilian General Data Protection Law (Lei Geral de Proteção de Dados Pessoais or LGPD) is a law that was passed by the National Congress of Brazil.
Read more
What is FISMA? FISMA Compliance Requirements
FISMA is a United States federal law that defines a comprehensive framework to protect government information, operations, and assets against threats.
Read more
What is Sensitive Data?
Sensitive data is information that must be protected against unauthorized access.
Read more
Sign up for our newsletter
UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
