Saturday, May 31, 2025

Signalgate: A Call to Reassess Security Onboarding and Training

Mobile Device Trade-In Values Surge 40% in the US

DSIT urges Ofcom to get ready for broader regulatory responsibilities covering datacentres.

AI and Private Cloud: Key Takeaways from Dell Tech World 2025

Four Effective Strategies for Recruiting Technology Talent in the Public Sector

US Unveils New Indictments Targeting DanaBot and Qakbot Malware Cases

Imec ITF World 2025: Pioneering the Future of AI Hardware

AI Solutions for Network Administrators | Computer Weekly

What is a Passkey? | TechTarget Definition

Taking Your Initial Steps Toward Enhanced International Compliance

To successfully market and sell products or services internationally, a company’s IT security team has to closely collaborate with its business and compliance teams. They need to define clear implementation requirements based on various international and national standards.

Staying updated on evolving security standards is crucial. Following news feeds and blogs from professional and industry groups can provide valuable insights. Specialized security magazines, especially those focusing on specific countries or regions, are also beneficial, particularly if they align with the company’s market interests.

There are several professional organizations that information security professionals can join, such as BCS (the Chartered Institute for IT), the Chartered Institute of Information Security, ISC2, and IEEE. These groups are excellent resources for learning about new and emerging security standards.

However, knowing international security requirements means little if you don’t understand where and how your business operates. It all begins with the business side. Different business areas must determine how they plan to sell and support their products abroad. Clearly communicating their needs to the compliance and IT security teams is essential.

Once those needs are established, the compliance and IT security teams can conduct focused research on specific countries and regions. This should lead to a tailored set of security requirements, which can then be reviewed and finalized in collaboration with the business. After agreement, the IT team can implement the necessary measures.