The transition period from PCI DSS 3.2.1 to 4.0 is ending soon. Learn when is PCI DSS 4.0 compliance required and how to go through the transition smoothly
Read moreCybersecurity Awareness Month 2023 focuses on cybersecurity tips and best practices for all individuals. Learn four simple ways to protect yourself, your family, and your business from online threats.
Read moreA good CISO is definitely an experienced professional who meets your organization’s needs. Learn more about how to hire the right CISO
Read moreRansomware protection is one of the key security concerns. Learn the the current state of ransomware to stay ahead of this threat
Read moreCloud adoption entails multiple cloud security challenges. Unravel the complexities of safeguarding data, privacy, and compliance in cloud environments
Read moreGoogle Analytics is a powerful data tracking tool, but it is not HIPAA compliant out of the box. Planet 9 explains how to make your Google Analytics HIPAA compliant.
Read moreSecure software development attestation is a must for businesses supplying software to federal agencies. Continue reading to learn more.
Read moreNIST SSDF represents secure software development practices and helps developers reduce vulnerabilities. Learn more about the NIST SSDF key security practices.
Read moreFor over 15 years DBIR helps to stay ahead of emerging cyber threats. Learn the 2023 DBIR key takeaways and leverage the findings to strengthen your cybersecurity posture.
Read moreNIST 800-171 Revision 3 is released. Learn about the most significant changes introduced through the NIST updates.
Read moreGDPR fines make non-compliance a costly mistake. Learn the GDPR’s logic for imposing the fines and take note of the largest GDPR fines to date
Read moreCCPA compliance is a must-have for many businesses operating in California. Learn about the main obligations under CCPA and how to apply them in practice.
Read moreAI Cybersecurity is a double-edged sword. While while AI reinforces our cyber defense, it still has vulnerabilities and may be offensive. Learn about AI-related security issues.
Read moreSOC 2 audit is a great way to demonstrate your data security commitment. Learn how SOC 2 readiness assessment can raise your chances for a successful audit.
Read moreThe main theme of 2023 RSAC is “Stronger Together.” It involves creating a cohesive front that leverages diverse knowledge to combat cyber threats.
Read moreBy hiring a vCISO, businesses expect to cover all their information security and compliance needs. Learn how much a vCISO costs depending on your business needs.
Read moreWhether you’re a covered entity or business associate, HIPAA compliance is a must. See the checklist to ensure you’re a HIPAA-compliant entity
Read moreSVB collapse rocked the financial industry, yet cybersecurity is also challenged. Learn about the main cybersecurity risks amid SVB collapse.
Read moreThe 2023 National Cybersecurity Strategy targets critical infrastructure owners. Learn about the Strategy’s key points and implications
Read moreThe PCI DSS released new version 4.0 at the end of March 2022. Find out what’s the most important in the PCI DSS 4.0 Updates
Read moreTechnologies make schools more efficient while putting them at cybersecurity risk. See what CISA recommends on K-12 cybersecurity
Read moreISO 27001:2013 was updated to ISO 27001:2022 at the end of October. Let’s figure out what your business should do with ISO 27001 updates
Read moreThe 2023 cybersecurity landscape promises to be dynamic. Take a look at our shortlist of core events that’ll affect cybersecurity in 2023
Read moreThe Russian invasion of Ukraine drew the trajectory of 2022 cybersecurity. Learn how the war affected the cyber environment over the passing year
Read moreThe GLBA compliance deadline has been extended to June 9, 2023. Learn about the reasons of this extension and figure out how the GLBA compliance works
Read moreCISOs act as shields protecting your company’s property, data, and assets. Learn how to choose the best CISO services for your business.
Read moreAre you a merchant, a service provider or both? Learn how to identify your PCI compliance level.
Read moreAdvocate Aurora exposed 3M PHI due to using data tracking technologies. Ensure compliance when processing and storing PHI and think twice before using data analytics
Read moreTake a look at the main parts of PCI DSS compliance and learn why your organization’s merchant level matters
Read moreMost modern human-centric data breaches involve social engineering. Learn how to protect against this kind of attack, and don’t let cybercriminals deceive you
Read moreHackers use different social engineering techniques to trick users into sending money or disclosing sensitive data. Learn how to spot social engineering threats
Read moreThe 2022 Cybersecurity Awareness Month focuses on “people part” of cybersecurity. Learn about the human factor and how hackers use their creativity to exploit human-related vulnerabilities
Read moreInformation security policy plays a vital role in protecting data confidentiality, integrity, and availability. Learn how to develop your policy.
Read moreThe GLBA updates become effective in December. Make sure you’ve revised your policies and procedures to comply with new requirements.
Read moreFederal agencies warn on tactics, techniques, and procedures used by Zeppelin ransomware actors
Read moreCIRCIA requires critical infrastructure organizations to report substantial cyber incidents and ransom payments. Read more about the new law
Read moreEvery year the RSAC keynote speakers bring their unique insights on the future of cybersecurity. Learn what’s new in 2022 RSAC
Read moreWeak human firewalls force businesses to adopt advanced access controls. Read our blog to get familiar with access controls that mitigate some of the risks associated with human factors.
Read moreThe complexity of the modern cybersecurity landscape is calling for new defense approaches. Learn about zero trust, its main principles, and its mechanisms
Read moreLearn about best practices that will enhance mobile device security and enable businesses to provide their employees with secure access to corporate resources
Read more