Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

The Differences Between SOX 302 and 404 Requirements

The Sarbanes-Oxley Act of 2002 (SOX) is a law that implements regulations on publicly traded companies and accounting firms. SOX was created to improve the accuracy and reliability of corporate disclosures in financial statements and to protect investors from fraudulent accounting practices.

3 Trends Where Technology Can Simplify Vendor Risk Management

Vendor risk management is the practice of governing third-party access to company data. This is a critical aspect of an organization since vendors view your business information when providing their services. For some, this can turn into a severe vulnerability that can lead to data breaches. In fact, in the past five years, vendors like Home Depot and Target were responsible for those incidents, as reported by Forbes.

Max Aulakh | Interviews | Michael Fulton | AVP IT Strategy and Innovation | Nationwide

Max Aulakh, CEO of Ignyte Assurance Platform, interviews Michael Fulton, AVP IT Strategy and Innovation for Nationwide. Join the conversation as they discuss using an innovative interface to give agents the products they need, bringing the products to the customer, and cultural changes and how they impact the business.

Max Aulakh | Interviews |Anupam Srivastava | CISO| State of Ohio |

Ignyte CEO, Max Aulakh interviews Anupam Srivastava, Chief Information Security Officer for the State of Ohio discusses the impacts Ohio counties are making through technology, measures the state is taking to detect and combat security vulnerabilities, and bridging the gap in the talent pool.

Neal Saling | Interviews | Michael Hofherr

Neal Saling director of Ignyte Assurance Platform interviews Michael Hofherr, VP & CIO for The Ohio State University. Michael shares his thought leadership and discusses challenges and opportunities for IT in the university space, the role technology will play in the workforce over the next 10 years, how technology will change the higher education landscape for future students, and key leadership skills.

Protecting your GCP infrastructure at scale with Forseti Config Validator part three: Writing your own policy

No two Google Cloud environments are the same, and how you protect them isn’t either. In previous posts, we showed you how to use the Config Validator scanner in Forseti to look for violations in your GCP infrastructure by writing policy constraints and scanning for labels. These constraints are a good way for you to translate your security policies into code and can be configured to meet your granular requirements.

How does risk management reduce the impact of a cyber attack?

What do healthcare, banking, and the insurance industry all have in common? RISK! Regardless of industry, having an application, or system compromised could mean the exposure of extremely sensitive information. If such information became public knowledge your business could suffer tremendously. For many companies, a data breach is the worst possible situation imaginable. How does an organization work to reduce the impact of a system being compromised?

Protecting your GCP infrastructure at scale with Forseti Config Validator part two: Scanning for labels

Welcome back to our series on best practices for managing and securing your Google Cloud infrastructure at scale. In a previous post, we talked about how to use the open-source tools Forseti and Config Validator to scan for non-compliant tools in your environment. Today, we’ll go one step further and show you another best practice for security operations: the systematic use of labels.

Sox Management Review Controls

The Sarbanes-Oxley Act of 2002 (SOX) designates management review controls (MRCs) as one of the required internal controls. MRCs are the reviews of key financial information conducted by a company’s management to assess its reasonableness and accuracy. They are a key aspect of a public company’s internal control over financial reporting (ICFR).

Protecting your GCP infrastructure at scale with Forseti Config Validator

One of the greatest challenges customers face when onboarding in the cloud is how to control and protect their assets while letting their users deploy resources securely. In this series of four articles, we’ll show you how to start implementing your security policies at scale on Google Cloud Platform (GCP). The goal is to write your security policies as code once and for all, and to apply them both before and after you deploy resources in your GCP environment.