Skip to main content
Search
Home    /    Insights & Resources

Insights & Resources

Start exploring insights from across the industries we serve, featuring the latest industry trends, compliance alerts, tax and accounting news and much more.

Connecticut recently adopted a data privacy law that applies to residents and any company collecting, processing and storing the data of Connecticut residents.
Find out how outsourcing cloud monitoring can impact your organization and what are appropriate ways to maintain oversight of these service providers.
Weaver highlights various questions and risks you should consider when deciding what cloud monitoring program is best for your organization.
As the SEC considers regulations to strengthen cybersecurity in public companies, concerns about cyberattacks are on the rise. Learn more.
Get started on implementing the new PCI DSS 4.0 requirements that will take effect over the next several years.
Find out if your organization will be affected by the Utah Consumer Privacy Act (UCPA) that will take effect on December 31, 2023.
To improve cyber resiliency in the financial sector, the Securities and Exchange Commission (SEC) recently proposed amendments to existing regulation of the technology infrastructure in U.S. securities markets.
In an almost numbing and normalizing fashion, we see ransomware continuing to make news. While the attacks are described with new language, the tactics and techniques utilized are very similar. Consider the loss of others a free assessment for your organization to learn from those mistakes.
Find out if your organization will be affected by the Colorado Privacy Act (CPA) that will take effect July 1, 2023.
Learn the steps that your organization can take to reduce your risks and make it easier to recover if you do suffer a ransomware attack.
Find out which cybersecurity questions you should be asking at your next board of directors meeting to protect your organization against any threats.
A long-awaited, thoughtful and clear document, Kubernetes Hardening Guidance, was published recently by the National Security Agency (NSA) and the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA).