Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

State Security Breach Notification Laws

A security breach is defined as any unauthorized access or acquisition that compromises the security, confidentiality, integrity or availability of covered information, systems, and applications. Recent years have seen significant amounts of legislative activity related to state data breach notification laws. South Dakota and Alabama enacted new data breach notification laws in 2019, becoming the last of 50 U.S. states to enact such laws.

In-House Counsel: Best Legal Practices in Data Breaches

The likelihood that your organization will suffer a material data breach in the next 2 years is nearly 28%, and that’s higher than last year’s risk according to The Ponemon Institute’s 2018 Cost of a Data Breach Study: Global Overview. Counsel’s best strategy is to insist on a strong organizational plan to quickly and effectively respond to data breaches and, ultimately, prevent them in the future.

Ignyte - GRC Company for Cybersecurity Receives Funding

January 15, 2019 Miamisburg, OH – Ignyte Assurance PlatformTM, an industry leader in managing governance, risk and compliance (GRC), has received $100,000 from the state of Ohio to develop and integrate cybersecurity technology from the Air Force Research Laboratory. The company will use the funding to develop and integrate cybersecurity technology from the Air Force Research Laboratory to improve data collection and analysis.

Benefits of a Secure Software Development Life Cycle (SDLC)

The software development life cycle abbreviated SDLC, is a term used for the process of developing, altering, maintaining, and replacing a software system. SDLC is comprised of several different phases, including planning, design, building, testing, and deployment. In Secure SDLC, security assurance is practiced within in each developmental phase of the SDLC. Throughout each phase, either penetration testing, code review, or architecture analysis is performed to ensure safe practices.

PCI DSS Compliance: An Overview

The Payment Card Industry (PCI) comprise all credit card providers including Visa and MasterCard. These entities are required to uphold the integrity of the cardholders' information to prevent any breach. While complying with the PCI DSS requirements can be overwhelming, it is necessary since it'll enable you to develop stringent measures to store and protect the cardholders' data.

How To Get Compliant and Stay Agile

Agile companies do things faster. When you think about agile regarding lean startup model, you focus on quick wins, ruthless prioritization, external focus, and continuous improvement. At its core, agile development relies on continuous testing leading to continuous improvement. In cybersecurity, continuous monitoring enables an agile continuous compliance stance.