#cybersecurity

When is PCI DSS 4.0 Required?

The transition period from PCI DSS 3.2.1 to 4.0 is ending soon. Learn when is PCI DSS 4.0 compliance required and how to go through the transition smoothly

Read more

Cybersecurity Awareness Month 2023: Secure Our World

Cybersecurity Awareness Month 2023 focuses on cybersecurity tips and best practices for all individuals. Learn four simple ways to protect yourself, your family, and your business from online threats.

Read more

How to Hire the Right CISO

A good CISO is definitely an experienced professional who meets your organization’s needs. Learn more about how to hire the right CISO

Read more

Ransomware Protection: How the Current State of Ransomware Shapes Your Strategy

Ransomware protection is one of the key security concerns. Learn the the current state of ransomware to stay ahead of this threat

Read more

What are the Main Cloud Security Challenges?

Cloud adoption entails multiple cloud security challenges. Unravel the complexities of safeguarding data, privacy, and compliance in cloud environments

Read more

Is Google Analytics HIPAA Compliant? 

Google Analytics is a powerful data tracking tool, but it is not HIPAA compliant out of the box. Planet 9 explains how to make your Google Analytics HIPAA compliant. 

Read more

Secure Software Development Attestation 

Secure software development attestation is a must for businesses supplying software to federal agencies. Continue reading to learn more. 

Read more

Key Highlights of the NIST SSDF: Secure Software Development Framework

NIST SSDF represents secure software development practices and helps developers reduce vulnerabilities. Learn more about the NIST SSDF key security practices. 

Read more

2023 DBIR Overview

For over 15 years DBIR helps to stay ahead of emerging cyber threats. Learn the 2023 DBIR key takeaways and leverage the findings to strengthen your cybersecurity posture.

Read more

NIST 800-171 Revision 3: Updated Requirements for CUI Protection

NIST 800-171 Revision 3 is released. Learn about the most significant changes introduced through the NIST updates.

Read more

Largest GDPR Fines to Date 

GDPR fines make non-compliance a costly mistake. Learn the GDPR’s logic for imposing the fines and take note of the largest GDPR fines to date

Read more

CCPA Compliance: What are Business Obligations?

CCPA compliance is a must-have for many businesses operating in California. Learn about the main obligations under CCPA and how to apply them in practice.

Read more

AI in Cybersecurity: Risks and Vulnerabilities

AI Cybersecurity is a double-edged sword. While while AI reinforces our cyber defense, it still has vulnerabilities and may be offensive. Learn about AI-related security issues.  

Read more

SOC 2 Readiness Assessment Guide

SOC 2 audit is a great way to demonstrate your data security commitment. Learn how SOC 2 readiness assessment can raise your chances for a successful audit.

Read more

2023 RSAC: Key Takeaways

The main theme of 2023 RSAC is “Stronger Together.” It involves creating a cohesive front that leverages diverse knowledge to combat cyber threats.

Read more

How Much Does a vCISO Cost?

By hiring a vCISO, businesses expect to cover all their information security and compliance needs. Learn how much a vCISO costs depending on your business needs.

Read more

What Does it Mean to be a HIPAA-Compliant Entity?

Whether you’re a covered entity or business associate, HIPAA compliance is a must. See the checklist to ensure you’re a HIPAA-compliant entity

Read more

Cybersecurity Risks amid SVB Collapse

SVB collapse rocked the financial industry, yet cybersecurity is also challenged. Learn about the main cybersecurity risks amid SVB collapse.

Read more

2023 National Cybersecurity Strategy Review 

The 2023 National Cybersecurity Strategy targets critical infrastructure owners. Learn about the Strategy’s key points and implications

Read more

PCI DSS 4.0 Updates. All you Need to Know

The PCI DSS released new version 4.0 at the end of March 2022. Find out what’s the most important in the PCI DSS 4.0 Updates

Read more

CISA Advices on K–12 Cybersecurity

Technologies make schools more efficient while putting them at cybersecurity risk. See what CISA recommends on K-12 cybersecurity 

Read more

What Should Businesses do with ISO 27001 Updates?

ISO 27001:2013 was updated to ISO 27001:2022 at the end of October.  Let’s figure out what your business should do with ISO 27001 updates

Read more

Cybersecurity in 2023: What to Expect? 

The 2023 cybersecurity landscape promises to be dynamic. Take a look at our shortlist of core events that’ll affect cybersecurity in 2023

Read more

2022 Cybersecurity Year in Review 

The Russian invasion of Ukraine drew the trajectory of 2022 cybersecurity. Learn how the war affected the cyber environment over the passing year 

Read more

GLBA Compliance Updates: Deadline Extended 

The GLBA compliance deadline has been extended to June 9, 2023. Learn about the reasons of this extension and figure out how the GLBA compliance works

Read more

CISO Services: Benefits, Trends, and Functions

CISOs act as shields protecting your company’s property, data, and assets. Learn how to choose the best CISO services for your business.

Read more

Identify your PCI compliance level

Are you a merchant, a service provider or both? Learn how to identify your PCI compliance level.

Read more

Using Data Analytics may not be HIPAA Compliant 

Advocate Aurora exposed 3M PHI due to using data tracking technologies. Ensure compliance when processing and storing PHI and think twice before using data analytics

Read more

RoC, AoC, and Other Elements of PCI DSS Compliance

Take a look at the main parts of PCI DSS compliance and learn why your organization’s merchant level matters

Read more

Protect Yourself Against Social Engineering Attacks 

Most modern human-centric data breaches involve social engineering. Learn how to protect against this kind of attack, and don’t let cybercriminals deceive you

Read more

Social Engineering as the Art of Deceiving

Hackers use different social engineering techniques to trick users into sending money or disclosing sensitive data. Learn how to spot social engineering threats 

Read more

“See Yourself in Cyber”: Human Factor in Cybersecurity

The 2022 Cybersecurity Awareness Month focuses on “people part” of cybersecurity. Learn about the human factor and how hackers use their creativity to exploit human-related vulnerabilities

Read more

Developing Information Security Policy 

Information security policy plays a vital role in protecting data confidentiality, integrity, and availability. Learn how to develop your policy.

Read more

GLBA Updates Reminder 

The GLBA updates become effective in December. Make sure you’ve revised your policies and procedures to comply with new requirements.

Read more

CISA and FBI Warn on Zeppelin Ransomware

Federal agencies warn on tactics, techniques, and procedures used by Zeppelin ransomware actors

Read more

CIRCIA: Critical Infrastructure Now to Report Cyber Incidents and Ransom Payments 

CIRCIA requires critical infrastructure organizations to report substantial cyber incidents and ransom payments. Read more about the new law

Read more

2022 RSAС: Key Takeaways

Every year the RSAC keynote speakers bring their unique insights on the future of cybersecurity. Learn what’s new in 2022 RSAC

Read more

Reinforcing the Weakest Security Link with Access Controls 

Weak human firewalls force businesses to adopt advanced access controls. Read our blog to get familiar with access controls that mitigate some of the risks associated with  human factors.

Read more

Building a Successful Zero Trust Strategy

The complexity of the modern cybersecurity landscape is calling for new defense approaches. Learn about zero trust, its main principles, and its mechanisms

Read more

Mobile Device Security

Learn about best practices that will enhance mobile device security and enable businesses to provide their employees with secure access to corporate resources

Read more