Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2023

PCI DSS Checklist: Secure Your Business

The PCI DSS Checklist is a crucial first step in securing your business. It’s a tool that helps businesses ensure they’re meeting all the requirements of the Payment Card Industry Data Security Standard (PCI DSS). By following the steps outlined in the checklist, businesses can take a comprehensive approach to security measures and access controls, and respond to new threats posed by technological advancements.

Prevention Is the Best Preparation for the SEC's New Breach Disclosure Rules

The U.S. Securities and Exchange Commission (SEC) this week voted to adopt new rules for how companies inform investors about cybersecurity concerns. The vote comes after years of gradually increasing guidance and scrutiny over companies’ handling of cybersecurity events and follows a lengthy comment period where companies, including CrowdStrike, provided input.

The SEC's new cybersecurity disclosure rules - are you ready?

The U.S. Securities and Exchange Commission (SEC) announced new regulations for public companies requiring them to disclose a “material cybersecurity incident” via formal report due four business days after a company determines that a cybersecurity incident is material. This is creating a lot of buzz, with companies worried if they will be prepared.

How to Quantify the ROI of your GRC & Security Programs

GRC programs are often viewed as cost centers. But, they can in fact be profit drivers by contributing to sales acceleration, cost and time savings, and risk reduction. The real question is, how can you prove that to the board? TrustCloud teamed up with ISSA to discuss.

SEC Implements New Rule Requiring Firms to Disclose Cybersecurity Breaches in 4 Days

What happened? The SEC (Securities and Exchange Commission) has introduced new rules that require public companies to be more transparent about their cybersecurity risks and any breaches they experience. This means companies will need to regularly share information about how they're managing cybersecurity risks and any significant cybersecurity incidents they've had. If a company experiences a significant cybersecurity incident, they'll need to report it within four business days.

Think Twice Before Embarking on Your CMMC 2.0 Compliance Journey Alone

Like a multitude of professions, the field of Information Technology (I.T.) is vast and requires specialized experience. There are network infrastructure specialists, risk and compliance analysts, cybersecurity professionals, technical generalists and more. I.T.

What is the VCDPA? Comprehensive Guide + Compliance Tips

The Virginia Consumer Data Protection Act (VCDPA) was the second comprehensive consumer privacy law passed in the United States. The act followed the California Consumer Privacy Act (CCPA) and took effect on January 1, 2023. Commercial organizations that conduct business in Virginia and process consumer data will be the most affected by the VCDPA. Learn how UpGuard’s comprehensive cybersecurity solution can help your business remain compliant>

NIS2 Directive and cyber risk management

The NIS2 Directive, published in December 2022, sets out a series of measures for improving cyber risk management throughout the European Union. All EU member states must apply the Directive as part of national law by October 2024. By the same date, all applicable organizations must comply with the measures set out in NIS2.

What is TX-RAMP? Full Compliance Guide

TX-RAMP (Texas Risk and Authorization Management Program) is a cybersecurity program that was modeled after the similarly named FedRAMP and StateRAMP programs to ensure that cloud computing services that work with federal or state agencies have adequate security controls in place. TX-RAMP was created by the Texas Department of Information Resources (DIR) to provide a method to review the security measures taken by cloud-based products and services that process and transmit data to Texas state agencies.

SEC: Public Companies Must Disclose Material Cybersecurity Incidents Within 4 Days

The US Securities and Exchange Commission (SEC) adopted new rules for cybersecurity risk management, strategy, governance, and incident disclosure by public companies on July 26, requiring public companies to disclose material cybersecurity incidents within four days of an attack. Additionally, registrants must annually report their process, if any, for assessing, identifying, and managing material risks from cybersecurity threats.

3 Takeaways: New SEC Cyber Risk Disclosure Rules

Yesterday the US Securities and Exchange Commission (SEC) voted 3-2 to issue long-awaited regulations that mandate uniform cyber incident disclosures for public companies. The SEC’s rulemaking progress has been lengthy and controversial, and cybersecurity experts and business advocates have been eagerly awaiting the release of the final rules after more than a year of public comment and lobbying from business and cyber experts.

Forward Networks Achieves SOC 2 Type 1 Compliance, Demonstrating Commitment to Transparency and Data Security

Forward Networks announces it has successfully achieved System and Organization Controls (SOC) 2 Type 1 Compliance. The completion of the audit demonstrates Forward Network's commitment to transparency, privacy, and data security for customers.

ISO 27002 puts Threat Intelligence center stage

The ISO 27000 series is an industry standard that has long defined and dictated base-level requirements for organizations’ information security management systems (ISMS). Through more than a dozen standards, the framework helps organizations demonstrate management commitment to their ISMS as they regularly review and improve their systems and procedures.

Connect any app to Vanta with Private Integrations

We’re thrilled to announce the launch of Private Integrations today, enabling Vanta customers to easily connect their in-house or third-party applications to Vanta’s Trust Management platform. With Private Integrations, in-house systems that need compliance controls can now be managed with the same level of automation as any third-party application available in Vanta’s integration directory.

Compliance? WhiteHat Dynamic has you covered

WhiteHat™Dynamic delivers the compliance testing you need, without slowing down development. Your business runs on an ever-changing combination of software you build, software you borrow, and software you buy. Of course you need run your business at the speed of software, but these ever-changing apps and systems can contain vulnerabilities that can be exploited to disrupt, threaten, and steal essential data.

How to Quantify the ROI of Your GRC & Security Programs: 3 Lessons Learned from Successful GRC Teams

GRC programs are often viewed as cost centers. But, they can in fact be profit drivers by contributing to sales acceleration, cost and time savings, and risk reduction. In this session, we shared insights on calculating the ROI of GRC, by connecting to key metrics like contractual liability, resource costs, and operational efficiency. We also provided practical examples of how to gauge program success.

What Are the Types of Audit Evidence?

The collection and evaluation of audit evidence plays an important role in assessing an organization’s compliance with established standards. The American Institute of Certified Public Accountants (AICPA) serves as a guiding force, establishing methods that auditors should use to carry out their duties effectively. As auditors start their examination, they first collect and analyze various types of audit evidence, each serving as a piece of the puzzle that forms the auditor’s report.

What is the Texas Data Privacy and Security Act (TDPSA)?

The Texas Data Privacy and Security Act (TDPSA) was enacted on June 18, 2023, making Texas the tenth U.S. state to authorize a comprehensive privacy law that protects resident consumers. The TDPSA borrows many statutes from other state privacy laws, mainly the Virginia Consumer Data Protection Act (VCDPA) and the California Consumer Privacy Act (CCPA).

Vanta Names Enterprise Saas Leader Jeremy Epling As Chief Product Officer

Vanta announces it has appointed Jeremy Epling as its Chief Product Officer overseeing engineering, product and design, reporting directly to Vanta's CEO Christina Cacioppo. Epling is the second C-Suite executive to join Vanta's leadership team this year with David Eckstein coming onboard in January as Chief Financial Officer.

How to start a security compliance program

Security compliance programs help your organization identify, implement, and maintain appropriate security controls to protect sensitive data, comply with laws and contractual obligations, and adhere to the standards, regulatory requirements, and frameworks needed to protect customers and enable the business to succeed. ‍ In other words, with a security compliance program in place, companies are able to demonstrate that they meet designated security requirements and objectives.

What is the CMMC (Cybersecurity Maturity Model Certification)?

The Cybersecurity Maturity Model Certification (CMMC) is a US Department of Defense (DoD) certification framework that aims to protect sensitive information handled by Defense Industrial Base (DIB) contractors by establishing a set of cybersecurity standards and best practices to follow. DIB partners often handle critical DoD information and other government data to operate, which typically has various levels of sensitivity and classification.

Continuous Monitoring for Real Time Compliance

The increasing number and sophistication of data breaches has led to increased concern among boards, regulators, and the public about threats to the data environment. That, in turn, has led to a desire for constant data protection – and a rise in the importance of continuous compliance monitoring to be sure that those data protection efforts are always sufficient and working.

How Vanta combines automation & customization to supercharge your GRC program

As the industry’s first automated compliance platform, Vanta includes a wealth of pre-built content, which enables customers without existing compliance processes to quickly get up and running. ‍ But more mature organizations may already have a compliance program — from the processes they follow to the definitions of their compliance and security surface area — that is built to meet their unique compliance goals, auditor requirements, and tech stack.

The Ultimate Security Questionnaire Guide for Vendors

Welcome to our guide on Security Questionnaires (SQs)! We’ll cover everything you need to know about SQs, including a complete breakdown of what they’re all about, what risk assessments look like from a prospective customer’s POV, and best practices for the vendors responding. Let’s get started!

CMMC Requirements For Small Businesses

There are five levels that make up the Cybersecurity Maturity Model Certification (CMMC) framework. These levels range from Level 1 (Basic Cyber Hygiene) to Level 5 (Advanced/Progressive). With each level of cybersecurity certification, the requirements of the previous level are built upon and new controls and practices are introduced.

Centralized Log Management for ANSSI and CIIP Framework Compliance

Decree No. 2009-834 established ANSSI (Agence nationale de la sécurité des systèmes d’information) as the National Cybersecurity Agency of France in 2009. In 2013, Article 22 of the Military Programming Law defined ANSSI’s functions and responsibilities, giving the agency regulatory and enforcement powers. Further, ANSSI is France’s primary point of contact with the larger European Union (EU) Network and Information Systems (NIS) Directive, with Decree No.

FIPS 140-2: Validation VS Compliance

NIST established the crucial set of guidelines known as FIPS 140-2 to safeguard sensitive data, particularly for governmental organizations. It is to provide security and privacy when encrypting and decrypting data. The primary distinction between FIPS 140-2 validation and compliance is that. In contrast, validation involves determining if a system or product has been developed to comply with the standard’s requirements; compliance is putting those requirements into practice.

Why SOC 2 is an Industry Standard

SOC 2 (Service Organization Control 2) provides a framework for assessing and reporting on the security, availability, processing integrity, confidentiality, and privacy of systems and data of service organizations. It was developed by the American Institute of Certified Public Accountants (AICPA) to address the need for consistent and comprehensive security and privacy controls in service organizations.

Understanding the Differences Between DFARS and CMMC

Cybersecurity challenges continue to grow in impact and complexity, especially as they relate to government and Defence information. In response to increasing hacking and cyber attacks, the Department of Defense (DoD) has released the DFARS and CMMC information management and cybersecurity standards to reduce the risk of system compromises within government agencies and the defense industrial base (DIB) that supports them.

Audit and Compliance with Calico

In this blog post, I will be talking about audit and compliance and how to implement it with Calico. Most IT organizations are asked to meet some standard of compliance, whether internal or industry-specific. However organizations are not always provided with the guidance to implement it. Furthermore, when guidance has been provided, it is usually applicable to a more traditional and static environment and doesn’t address the dynamic nature of Kubernetes.

The Road to Continuous Compliance

Compliance is often viewed as a “one and done” activity – an annual rite of passage, for example, performed during yearly audits. That is an archaic approach to compliance in the modern business world, and won’t suffice any longer. Instead, organizations must adopt a mindset of continuous compliance, where adherence to regulatory requirements becomes integral to day-to-day operations. How can a company achieve that evolved state?

Trust Talks with Annie O'Rourke, Director of Compliance, Audit and Assurance at Snyk

Sravish sits down with Annie O’Rourke to discuss the latest security and GRC trends. Discover the secrets to making GRC more accessible for your company, sharing impactful metrics with the board, and find out why Annie and the Snyk team love using Awarego!

UK Telecommunications Security Act 2021: 3 Documents From The Regulators Every Telco Executive Should Read

In 2019, the UK Government (NSCS) conducted The UK Telecoms Supply Chain Review, to assess and address potential risks associated with the supply chain of telecommunications infrastructure in the country. The review highlighted the risks associated with reliance on certain vendors, particularly those with high-risk profiles. It also recommended increased oversight and regulation to mitigate security risks and protect critical national infrastructure.

PCI DSS Compliance in Healthcare

Data security has become an essential aspect of our lives and is more crucial than ever before. In the healthcare industry, organizations are entrusted with a plethora of sensitive information, including PHI, PII, and financial data. This renders them accountable for complying with both HIPAA and PCI regulations. Adherence to these regulations is paramount for safeguarding sensitive patient information from data breaches and cyber attacks.

DFARS Compliance: What You Need to Know

Businesses that work with the US Department of Defense (DoD) and collect, process, transmit, or store controlled unclassified information (CUI) must comply with Defense Federal Acquisition Regulation Supplement (DFARS) standards. The DoD has responded to the growing threat of cyber incidents, including cyberattacks from cybercriminals and nation-states, by prioritizing cybersecurity best practices and insisting they are implemented throughout the DoD supply chain.