Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2022

Automotive Software - ISO 21434 Compliance Simplified

The modern vehicle comes equipped with a variety of software systems. Especially features that connect it to the outside world, such as online updates, fleet management and communication between vehicles, offer attack surface. The security of automotive software is crucial, not only because bug-induced call-backs are costly, but also because the well-being of passengers depends on it.

Kintent's Frank Kyazze Takes On Data Connectors Dallas, Identifies Industry Frustration with Security Audits

Recently, we caught up with Frank Kyazze, Privacy Director here at Kintent, to chat about his experience at the Data Connectors conference in Dallas last month. Frank had the opportunity to serve on the “Protecting Against Cyber Attacks” discussion panel while in attendance. Frank took part in the panel, discussing how now more than ever, it is imperative for organizations to be vigilant against bad actors.

Workflow Automation: Intelligent Task Delegation for Groups and Users

We believe compliance should be a team sport. With Workflow Automation, your team can be segmented into “groups”, including DevOps, Engineering, HR, and Legal. TrustOps intelligently delegates tasks, controls, tests, and systems into these groups. Group have owners, who assign each component of your company’s compliance program to the right person within their group.

Workflow Automation: Smart Inventory Management

You can now connect TrustOps to multiple SaaS vendors that you use to run your product and business, and we automatically collect inventory lists from these vendors to satisfy audit requirements. With this new release, TrustOps intelligently creates the following inventory lists for you: Databases in AWS RDS Logs from AWS Cloudwatch Alerts from AWS Cloudwatch Alerts IT assets from Jamf and Duo HR lists from BambooHR and TriNet.

Smart Custom Policies

Kintent policies now offer a new Edit Policy menu option, allowing you to customize existing text, write your own, or bring in the contents of an existing policy by pasting its text. Once in the editor, you will be able to format your policy, choose whether or not (and where) to insert its approval log and related control list, as well as add Kintent control texts. TrustOps also supports Smart Variables — dynamic, auto-updating values representing key attributes of a policy such as its owner, which you can use when composing your policy.

Customizing your controls

We know that your business is unique, and you may already have security and privacy programs in place, so we’ve made customization a focus and a pillar in our platform, making it effortless for you to craft custom controls and policies that are integral to your business. On the control details page in TrustOps, you now have the ability to edit a control and customize the control statement language, policy mappings and frequency of the control to accurately reflect your business practices.

Add Your Brand Identity to Your TrustShare

With this update, we’ve made it easy for your team to customize your TrustShare portal to reflect your brand identity. As part of the most recent update to the TrustShare Admin app, we’re excited to introduce a “Branding” section where you can select your brand’s color palette and add your logo. Your TrustShare will reflect your branding in the appropriate places as soon as you publish your selections. You also have the ability to preview changes before publishing, so you can ensure that everything looks and feels right.

TrustShare

As with everything we do at Kintent, we wanted to make it effortless for you to develop and share your information security program! Automatically Share Your Compliance Documents TrustShare is part of Kintent’s Trust Management Platform. It automatically pulls details from the platform, such as your controls, policies, security questionnaires, and subprocessors. Whenever a change is made to the underlying information, Trust Share is automatically updated, so you won’t ever have to worry about the validity of the compliance data you are sharing with your customers.

4 Types of Data The FedRAMP Boundary Generates and What it Means For You

The FedRAMP PMO recently announced new rules for how contractors will need to comply with the Federal Risk and Authorization Management Program (FedRAMP) Authorization Boundary rules in draft format. This is a big deal because FedRAMP compliance is mandatory for any company that wants to do business with the federal government.

How to achieve FedRAMP Certification?

We previously covered the basics of FedRAMP by simply asking “What is FedRAMP?” This time, we’re going to talk about how you can get approved as a FedRAMP Cloud Service Provider (CSP). We’ll talk about some of the advantages of being FedRAMP authorized. We’ll also discuss FedRAMP compliance versus certification to understand the difference. Additionally, we will define terms you will need to know during your FedRAMP journey.

How to Become FedRAMP Certified

We previously covered the basics of FedRAMP by simply asking “What is FedRAMP?” This time, we’re going to talk about how to become FedRamp Certified Cloud Service Provider (CSP). We’ll talk about some of the advantages of being FedRAMP authorized. We’ll also discuss FedRAMP compliance versus certification to understand the difference. Additionally, we will define terms you will need to know during your FedRAMP journey.

What Is the SHIELD Act And How Do You Achieve Compliance?

On the internet, we’re all Hansel and Gretel. But the trail of breadcrumbs we leave behind when searching, posting on social media or shopping online aren’t designed to help us find our way back home. Instead, they’re designed to help the companies we interact with provide a richer, more customized and useful online experience.

What is PCI Compliance?

In today’s fast-moving and competitive marketplace, you can barely find any businesses and merchants that still haven’t adopted the use of credit cards for their services. More than a third of American cardholders use credit cards for their transactions on a monthly basis. With the rising prevalence of identity theft, over 1.1 billion personal records were exposed by data breaches and credit card fraud alone.

3 Steps To Remain PCI Compliant with your AWS Configuration

Becoming and staying PCI compliant both take a lot of work. Developers are often already swamped with an endless list of tasks, and adding PCI compliance can be overwhelming. Security awareness is one thing, but a set of requirements is entirely different. It means you have less freedom in how you wish to implement security in your application, and you must understand the requirements demanded by your organization.

Integrity Monitoring Use Cases: Compliance

The IT ecosystems of enterprises are highly dynamic. Typically, organizations react to this volatility by investing in asset discovery and Security Configuration Management (SCM). These core controls enable businesses to compile an inventory of authorized devices and monitor the configurations of those assets. In addition to managing changes to their infrastructure, organizations must also keep an eye on the changes made to essential files.

Open Source Intelligence

The term “open source” refers in particular to records this is publically available. A huge part of the internet cannot be found using major search engines. This is called as “Deep Web”. Deep Web is a mass of websites, databases, files, and more that cannot be indexed by Google, Bing, Yahoo, or any other search engine. Despite this, much of the content of the dark web can be considered open source because it is easily available to the public.

What is FIPS 140-2?

Encryption is an important security tool for protecting sensitive data. However, not all solutions used the same cipher techniques. There are a number of encryption algorithms that can be used to secure data with varying levels of security. To set acceptable standards for encryption technologies used by the U.S. Government the National Institute of Standards and Technology (NIST) has published the Federal Information Processing Standards (FIPS) series. These standards define how U.S.

Things You Should Know About Your Privacy Online

Surveillance is becoming an increasingly standard component of modern life, posing a threat to the idea that people have a right to privacy. In many situations, we unwittingly provide companies with information about our preferences, routines, and interests. In this age of digital era, you must not rely on evolving surveillance regulations and vendors to keep your personal information and security intact.

Sponsored Post

Monitoring Transaction Log Files for PCI compliance

File Integrity Monitoring, aka as FIM, is a must-have feature for anyone in charge of security. With FIM, one can detect when a critical file, such as a file that belongs to the Operating System, or a key configuration file, is changed. In most cases, configuring FIM is straightforward: If the file changes then generate an alert.

CrowdStrike Enables Federal Departments and Agencies to Meet CISA Operational Directive 23-01

In support of the Executive Order on Improving the Nation’s Cybersecurity, the Cybersecurity and Infrastructure Security Agency (CISA) recently published a Binding Operational Directive (BOD) 23-01, designed to improve cybersecurity for the Federal Civilian Executive Branch (FCEB) enterprise and their respective unclassified assets.

How Can POA&Ms Help Improve Your Security Budgeting Process?

Have you ever heard an IT security pro talk about their POA&M and wondered what they meant? You’re not alone. Many security consultants and engineers are uncertain about the meaning of the acronym “POA&M”. It stands for Plan of Actions and Milestones. It’s a commonplace term within military and defense working environments.

4 tips to achieve Data Compliance

Data compliance is a crucial and essential factor in organizations that should be carefully followed for data management. Data compliance is more than maintaining relevant standards and regulations and ensuring that the data is secured. The substantial amount of data that is processed and used in organizations must be managed properly. All phases of data access, usage, modification, and storage should be governed by correct policies, protocols, and standards.

The dark side of AI energy consumption - and what to do about it

Artificial Intelligence’s ability to augment and support progress and development over the past few decades is inarguable. However, when does it become damaging, contradictory even? In our latest Beyond Data podcast AI’s Climate Jekyll & Hyde – friend and foe, Tessa Jones (our VP of Data Science, Research & Development) and Sophie Chase-Borthwick (our Data Ethics & Governance Lead) discuss exactly this with Joe Baguley, Vice President and Chief Technology Officer, EMEA, VMware.