Cloud security isn’t a one-way game. Both businesses and providers are responsible. Ensure you fulfill your part of the shared responsibility in SaaS cloud.
Read moreThe 2023 cybersecurity landscape promises to be dynamic. Take a look at our shortlist of core events that’ll affect cybersecurity in 2023
Read moreThe Russian invasion of Ukraine drew the trajectory of 2022 cybersecurity. Learn how the war affected the cyber environment over the passing year
Read moreThe GLBA compliance deadline has been extended to June 9, 2023. Learn about the reasons of this extension and figure out how the GLBA compliance works
Read moreCISOs act as shields protecting your company’s property, data, and assets. Learn how to choose the best CISO services for your business.
Read moreAre you a merchant, a service provider or both? Learn how to identify your PCI compliance level.
Read moreAdvocate Aurora exposed 3M PHI due to using data tracking technologies. Ensure compliance when processing and storing PHI and think twice before using data analytics
Read moreTake a look at the main parts of PCI DSS compliance and learn why your organization’s merchant level matters
Read moreMost modern human-centric data breaches involve social engineering. Learn how to protect against this kind of attack, and don’t let cybercriminals deceive you
Read moreHackers use different social engineering techniques to trick users into sending money or disclosing sensitive data. Learn how to spot social engineering threats
Read moreThe 2022 Cybersecurity Awareness Month focuses on “people part” of cybersecurity. Learn about the human factor and how hackers use their creativity to exploit human-related vulnerabilities
Read moreInformation security policy plays a vital role in protecting data confidentiality, integrity, and availability. Learn how to develop your policy.
Read moreThe GLBA updates become effective in December. Make sure you’ve revised your policies and procedures to comply with new requirements.
Read moreA beauty retailer pays $1.2 million fine for CCPA violation. It’s all about using third-party analytics on its website. Learn more with us.
Read moreFederal agencies warn on tactics, techniques, and procedures used by Zeppelin ransomware actors
Read moreADPPA would enact a unified federal privacy law governing the use of citizens’ personal information. Learn what it means for your business
Read moreCIRCIA requires critical infrastructure organizations to report substantial cyber incidents and ransom payments. Read more about the new law
Read moreSignificant material and reputational risks threaten contractors that have not implemented NIST SP 800-171, as the DoD memorandum states.
Read moreData breach reports prove the evolving trend of supply chain attacks in healthcare. Determine who is more responsible for third-party data incidents
Read moreSmall businesses are often led by misconceptions when it comes to HIPAA. Our free e-book can help with proper HIPAA compliance for start-ups.
Read moreEvery year the RSAC keynote speakers bring their unique insights on the future of cybersecurity. Learn what’s new in 2022 RSAC
Read moreWeak human firewalls force businesses to adopt advanced access controls. Read our blog to get familiar with access controls that mitigate some of the risks associated with human factors.
Read moreThe complexity of the modern cybersecurity landscape is calling for new defense approaches. Learn about zero trust, its main principles, and its mechanisms
Read moreHealthcare data breaches may give valuable lessons on how to address cyberthreats, yet their details are rarely made public. Learn why sharing the incident experience is crucial for healthcare
Read moreThe Utah Consumer Privacy Act (UCPA) is considered the most business-friendly state privacy law yet. Learn about the main facets of the law to be ready to comply in the future
Read moreMicrosoft and Okta suffered data breaches after a cybercrime group declared them as targets. Learn how the unique attack approach contributed to compromising the tech giants.
Read moreRansomware shows no signs of slowing down while its business model has changed. Read more about the state of ransomware in 2022.
Read moreDigital dependency prompts businesses to strengthen their technological defenses. Learn how security awareness training helps reduce cybersecurity risks.
Read morePractically all businesses are vulnerable to cyberthreats, and national security is not an exclusion. Learn how this tendency affects the decision-making process in national and business environments.
Read moreLearn about best practices that will enhance mobile device security and enable businesses to provide their employees with secure access to corporate resources
Read moreA data breach may be detrimental for businesses but much depends on their response. Learn how to react quickly and decisively if you’ve been breached.
Read moreCyberattacks plague colleges and universities. Learn why GLBA compliance in higher education institutions is important.
Read moreSupply chain attacks are on the rise. Learn how to align security efforts within your supply chain to reach a more desirable level of cyber protection.
Read moreThe year 2021 appeared challenging, given the number and severity of healthcare data breaches. Review some of the most severe incidents and get key takeaways of the past year.
Read moreCybercriminals are getting more motivated, organized, and sophisticated in executing attacks. Read our blog to learn about 2022 cybersecurity trends.
Read moreHIPAA is one of the most frequently demanded subject matters for SOC 2 audits. Learn more about the main peculiarities of the SOC 2 + HIPAA.
Read moreThe Security category is imperative for all SOC 2 engagements; but what if your commitments to customers and services demand including other criteria?
Read moreEvery SOC 2 audit encompasses from one to five categories while Security is a must-have. Learn more about how the Security-related controls are evaluated.
Read moreFall 2021 showed a slight increase in reported healthcare data breaches. Acquire the main tendencies, channels, and locations of cyberthreats.
Read moreOrganizations that fall under the EU’s GDPR may be required to perform DPIA. Learn more about the requirement and how it differs from the PIA.
Read moreSmall organizations often lack a dedicated leader to manage their security and compliance needs. Learn how vCISO can help.
Read moreFedRAMP Authorization is the main prerequisite to offering cloud services to the U.S. government. Learn more about the authorization requirements.
Read moreFollowing SolarWinds & Colonial Hacks, security officials Introduced draft legislation on cyber incident reporting. Learn how it may affect your organization
Read moreOne of the primary 2021 Cybersecurity Awareness Month’s focuses is resisting the phishing threat. Read how to fight against phishing and #BeCyberSmart!
Read moreSOC 2 is becoming a synonym for a reliable service provider. Learn how to prepare your organization for the SOC 2 audit and get a favorable audit opinion.
Read moreDiscover what updates CPRA will bring to CCPA’s data privacy requirements and realize their implications for your organization.
Read moreDisasters may be detrimental to organizations that don’t have an emergency plan. Planet 9 advises on how to ensure business continuity during a disaster.
Read moreCCPA grants Californian consumers privacy rights while imposing obligations on businesses. Learn how to meet these obligations and achieve CCPA compliance.
Read moreA detailed overview of the California Consumer Privacy Act (CCPA) and its requirements for data privacy. Learn how to work with consumers’ data in California.
Read more