Compliance and Regulations

Articles, news, and research on cybersecurity compliance and regulations.

Compliance and Regulations

Compliance and Regulations

Ultimate List of Cybersecurity Regulations by Industry

Cybersecurity regulations protect sensitive information from cyber threats. Explore the most well-known regulations, categorized by industry, in this blog.
Read more
Compliance and Regulations

Exploring the Monetary Authority of Singapore's TPRM Guidelines

Take a deep dive into the MAS guidelines for third-party risk management and the wide range of benefits for your financial organization.
Read more
Compliance and Regulations

ISA/IEC 62443-3-3 Questionnaire (Free Template)

Utilize this free questionnaire template for the ISA/IEC 62443-3-3, a commonly used security framework for industrial sector organizations.
Read more
Compliance and Regulations

COBIT 5 Framework Questionnaire (Free Template)

Use this free template for the COBIT 5 framework security questionnaire.
Read more
Compliance and Regulations

NIST 800-53 Security Standard Questionnaire (Free Template)

Track your compliance against NIST 800-53 with this free template. This questionnaire can also be used to see how vendors impact compliance efforts.
Read more
Compliance and Regulations

Free GDPR Vendor Security Questionnaire Template (2024 Edition)

Expand your organization's vendor risk management toolbox by utilizing this FREE GDPR vendor questionnaire template.
Read more
Compliance and Regulations

Essential Eight Compliance Questionnaire (Free Template)

Working to become Essential Eight compliant? Use this free questionnaire template to track progress and evaluate your cybersecurity posture.
Read more
Compliance and Regulations

Higher Education Community Vendor Assessment Toolkit (Free Template)

Utilize this free questionnaire template to evaluate third-party vendors against the Higher Education Community Vendor Assessment Toolkit.
Read more
Compliance and Regulations

HIPAA Questionnaire (Free Template)

Download this free HIPAA questionnaire template to help get started on getting your vendors properly assessed.
Read more
Compliance and Regulations

Essential Eight Compliance: Key Metrics To Track

Explore how tracking key metrics can help your organization work towards compliance with the Essential Eight cybersecurity framework.
Read more
Compliance and Regulations

What is the InfoSec Registered Assessors Program (IRAP)?

Learn more about Australia's Information Security Registered Assessors Program (IRAP) and key cybersecurity documents such as the ISM and PSPF.
Read more
Compliance and Regulations

Choosing an ISO 27001 Compliance Product

Looking for an all-in-one ISO 27001 compliance product? Check out the top features to look for, and how ISO 27001 compliance can benefit your organization.
Read more
Compliance and Regulations

What is FIPS 140-2? Cryptographic Module Validation Program

Learn more about FIPS 140-2 and the regulations and requirements the publication carries for cryptographic computer modules.
Read more
Compliance and Regulations

Effective Risk Management: The COSO ERM Framework

Explore the COSO ERM Framework, including fundamental standards, recent updates, and benefits for different organizations.
Read more
Compliance and Regulations

Using ISO 27002: 2022 to Improve Information Security Practices

Learn about ISO 27002: 2022 and how the framework supports better information security practices. An important resource if you're ISO 27001 certified.
Read more
Compliance and Regulations

Unpacking ISO 31010: Effective Risk Assessment Techniques

Learn about the different risk assessment techniques in ISO 31010 and how the standard can be used to support alignment with ISO 31000.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.