What Are Consent Requirements for GDPR Compliance?

Featured GDPR guide. Achieve 2025 GDPR compliance with Continuum's GRC software and phishing protection.

The General Data Protection Regulation (GDPR) is a set of regulations enforced in the European Union to protect consumer data privacy and instill new controls over data ownership and use. While only having jurisdiction in the EU, this law has had a major impact on how companies do business in Europe, especially digitally. 

Here, we’ll discuss some of the compliance requirements in place under GDPR for consent and privacy. These requirements are deeply ingrained into GDPR law and impact the professional and technical operations of organizations operating in the EU. 

 

Read More

What Is a Zero-Day Exploit?

Featured zero-day threats. Continuum GRC's 2025 defenses against zero-day attacks and vulnerability management.

With the news of the log4Shell bug making the rounds on industry and mainstream media, security experts are scrambling to address the implications of widespread bug patches and shared open-source utilities.

Here, we wanted to address some terminologies around the bug, specifically references to this bug representing a zero-day exploit. We’ll define zero-day exploits, why they are so dangerous and how security firms address them. 

 

Read More

The Glupteba Botnet: Threats to Businesses and Consumers

Featured botnet resources. Continuum's 2025 GRC for botnet detection, network security, and compliance.

December 7, 2021–the Google Threat Analysis Group (TAG) announced that it has identified and temporarily disrupted the Glupteba botnet responsible for infecting an estimated 1 million computers and IoT devices.

This temporary disruption seems to have slightly impacted the botnet’s operation, but currently, the network is still operational. 

Many of us may hear about botnets in the news or our compliance meetings… but what is a botnet? Here, we will cover the topic briefly and discuss the implications of Google’s move against this particular threat actor. 

 

Read More