Compliance and Regulations

Articles, news, and research on cybersecurity compliance and regulations.

Compliance and Regulations

Compliance and Regulations

What is the PGPA Act 2013? Accountability in the Public Sector

Learn what the PGPA Act 2013 is, how it affects businesses, and its cybersecurity implications.
Read more
Compliance and Regulations

Preventing Cybercrime: Australia’s Assistance and Access Act

Learn how The Assistance and Access Act prevents cybercrime in Australia through collaboration between law enforcement and industry.
Read more
Compliance and Regulations

GDPR Compliance: The Critical Role of Data Protection Officers

Explore Data Protection Officers' vital role in helping organizations prioritize data protection and maintain compliance with the GDPR.
Read more
Compliance and Regulations

TSSR: Protecting Australian Telecos Against Cyber Threats

Learn how Australia's Telecommunications Sector Security Reforms protect critical infrastructure and how to comply with this key regulation.
Read more
Compliance and Regulations

How to Comply with NIST SP 800-171 Revision 3

Dive into the latest revision of NIST 800-171 and learn what your organization must do to comply with the TPRM requirements of NIST 800-171 Rev. 3.
Read more
Compliance and Regulations

A Guide to the UK Modern Slavery Act 2015

Learn more about modern slavery and discover what your organization needs to do to comply with the UK Modern Slavery Act.
Read more
Compliance and Regulations

What is IEC/ISA 62443-3-3:2013? Cybersecurity & Compliance

Learn more about the IEC's 62443 series and discover the fundamental and system requirements included in section 3:3 of the series.
Read more
Compliance and Regulations

Industrial Control Systems Security: ISA 62443-2-1:2009

Explore key components of the ISA 62443-2-1:2009 standard, designed to help secure assets in industrial automation and control systems.
Read more
Compliance and Regulations

Choosing the Best Cybersecurity Compliance Software

Looking to invest in cybersecurity compliance software? Learn more about features to look for compliance software to achieve your organization's goals.
Read more
Compliance and Regulations

Ultimate List of Cybersecurity Regulations by Industry

Cybersecurity regulations protect sensitive information from cyber threats. Explore the most well-known regulations, categorized by industry, in this blog.
Read more
Compliance and Regulations

Exploring the Monetary Authority of Singapore's TPRM Guidelines

Take a deep dive into the MAS guidelines for third-party risk management and the wide range of benefits for your financial organization.
Read more
Compliance and Regulations

Free Template: ISA/IEC 62443-3-3 Questionnaire

Utilize this free questionnaire template for the ISA/IEC 62443-3-3, a commonly used security framework for industrial sector organizations.
Read more
Compliance and Regulations

Free Template: COBIT 5 Framework Questionnaire

Use this free template for the COBIT 5 framework security questionnaire.
Read more
Compliance and Regulations

Free Template: NIST 800-53 Security Standard Questionnaire

Track your compliance against NIST 800-53 with this free template. This questionnaire can also be used to see how vendors impact compliance efforts.
Read more
Compliance and Regulations

Free GDPR Vendor Security Questionnaire Template (2024 Edition)

Expand your organization's vendor risk management toolbox by utilizing this FREE GDPR vendor questionnaire template.
Read more
Compliance and Regulations

Free Template: Essential Eight Compliance Questionnaire

Working to become Essential Eight compliant? Use this free questionnaire template to track progress and evaluate your cybersecurity posture.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.