Compliance and Regulations

Articles, news, and research on cybersecurity compliance and regulations.

Compliance and Regulations

Compliance and Regulations

What is the InfoSec Registered Assessors Program (IRAP)?

Learn more about Australia's Information Security Registered Assessors Program (IRAP) and key cybersecurity documents such as the ISM and PSPF.
Read more
Compliance and Regulations

Choosing an ISO 27001 Compliance Product

Looking for an all-in-one ISO 27001 compliance product? Check out the top features to look for, and how ISO 27001 compliance can benefit your organization.
Read more
Compliance and Regulations

Effective Risk Management: The COSO ERM Framework

Explore the COSO ERM Framework, including fundamental standards, recent updates, and benefits for different organizations.
Read more
Compliance and Regulations

What is FIPS 140-2? Cryptographic Module Validation Program

Learn more about FIPS 140-2 and the regulations and requirements the publication carries for cryptographic computer modules.
Read more
Compliance and Regulations

Enhancing Cybersecurity in the Energy Sector with NERC CIP

Explore how the NERC CIP regulation secures and protects North America's bulk electric system from cyber threats.
Read more
Compliance and Regulations

A Deep Dive Into ISO 37301: Compliance Management Systems

Learn more about ISO 37301 and the framework's standards for compliance management systems (CMS).
Read more
Compliance and Regulations

A Guide to ISO 22301: Business Continuity Management Systems

Learn more about ISO 22301 and the framework's standards for business continuity management systems (BCMS).
Read more
Compliance and Regulations

Securing Essential Services: NIS Compliance Guidelines for OES

Explore how Europe helps protect the stability of its critical infrastructure through NIS Compliance Guidelines for Operators of Essential Services (OES).
Read more
Compliance and Regulations

Unpacking ISO 31010: Effective Risk Assessment Techniques

Learn about the different risk assessment techniques in ISO 31010 and how the standard can be used to support alignment with ISO 31000.
Read more
Compliance and Regulations

Using ISO 27002: 2022 to Improve Information Security Practices

Learn about ISO 27002: 2022 and how the framework supports better information security practices. An important resource if you're ISO 27001 certified.
Read more
Compliance and Regulations

What is ISO 9001? Quality Management System (QMS) Standards

Learn more about the standards ISO 9001 sets for quality management systems (QMS) and how to achieve ISO 9001 certification.
Read more
Compliance and Regulations

Exploring the ePrivacy Directive

Learn about the details of the EU's ePrivacy Directive, which focuses on data protection, personal data, and privacy in the modern digital age.
Read more
Compliance and Regulations

What is the Payment Services Directive 2 (PSD2)? Complete Guide

Learn more about the cybersecurity challenges and compliance requirements of the Payment Services Directive 2 (PSD2).
Read more
Compliance and Regulations

Exploring the TSA Pipeline Security Guidelines

Learn about this guideline designed to protect the cybersecurity and physical security of the United States' oil and natural gas pipeline system.
Read more
Compliance and Regulations

Understanding the HITRUST CSF and its Benefits

Dive into the HITRUST CSF and learn about this benchmark framework for protecting sensitive data, including benefits for healthcare organizations.
Read more
Compliance and Regulations

An Overview of India’s Digital Personal Data Protection Act of 2023

Learn more about the compliance requirements of India's Digital Personal Data Protection Act of 2023 (DPDP).
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating