Compliance and Regulations

Articles, news, and research on cybersecurity compliance and regulations.

Compliance and Regulations

Compliance and Regulations

NIS2 Compliance Checklist (Free)

Is your organization prepared for NIS2? Dive into the updated Network and Information Security Directive and utilize our free NIS2 compliance checklist.
Read more
Compliance and Regulations

What is the Critical Entities Resilience (CER) Directive?

Explore the latest initiative in the EU that aims to improve the cyber resilience of critical entities.
Read more
Compliance and Regulations

The EU's Strategy for a Cybersecure Digital Single Market

Explore the Digital Single Market Strategy's history, key components, and corresponding regulations that enhance cybersecurity across the European Union.
Read more
Compliance and Regulations

What is the Oregon Consumer Privacy Act (OCPA)?

Learn more about the Oregon Consumer Privacy Act (OCPA) and discover the obligations the privacy act imposes on data controllers and processors.
Read more
Compliance and Regulations

What is the Connecticut Data Privacy Act (CTDPA)?

Learn more about the Connecticut Data Privacy Act (CTDPA) and discover the obligations the privacy act imposes on data controllers and processors.
Read more
Compliance and Regulations

What is the EU Cyber Solidarity Act?

Explore the latest legislation in the EU for improving cyber resilience and incident response.
Read more
Compliance and Regulations

What is the Tennessee Information Protection Act (TIPA)?

Learn more about the Tennessee Information Privacy Act (TIPA) and discover the obligations the privacy law imposes on data controllers and processors.
Read more
Compliance and Regulations

What is the Montana Consumer Data Privacy Act (MTCDPA)?

Learn more about the Montana Consumer Data Privacy Act and uncover the obligations it imposes on data controllers and processors.
Read more
Compliance and Regulations

Preparing for NIS2: A Compliance Guide For Covered Entities

The EU's latest cybersecurity directive includes an expanded scope and obligations. Learn more about NIS2 in this informative guide.
Read more
Compliance and Regulations

Australia's Privacy Act Reforms: Enhanced Data Privacy for All

Australia's landmark privacy regulation is undergoing significant reforms. Learn about upcoming changes and how to best prepare for compliance.
Read more
Compliance and Regulations

Advanced GDPR Compliance Strategies for Cybersecurity

A list of little-known GDPR compliance strategies that you may not have yet considered. A helpful resource for those struggling with GDPR compliance.
Read more
Compliance and Regulations

Cross-Border Data Flow: The EU-US Privacy Shield's Demise

Explore the EU-US Privacy Shield, including the challenges leading to its invalidation, and updated transatlantic data privacy laws for the EU and US.
Read more
Compliance and Regulations

The NIST AI Risk Management Framework: Building Trust in AI

Learn about the newest NIST framework that aims to help businesses implement trustworthy AI systems.
Read more
Compliance and Regulations

Meeting Third-Party Risk Requirements of DORA in 2024

Learn how to achieve compliance with the third-party risk management standards of the Digital Operational Resilience Act (DORA)
Read more
Compliance and Regulations

The EU Cyber Resilience Act: Securing Digital Products

Learn about the new EU cyber legislation that aims to secure digital products and services.
Read more
Compliance and Regulations

Deciphering CUI: What is Controlled Unclassified Information?

Learn more about CUI and discover the steps your organization can take to protect its controlled unclassified information and achieve CMMC certification.
Read more
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.