Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is a Password Breach?

A password breach is when a cybercriminal has your password and is able to use it to get into your account. Password breaches can occur due to social engineering and insider threats, but most often, weak password habits are the culprit. Keep reading to learn more about how passwords get breached, what can happen if your passwords are breached and how to prevent password breaches from happening.

Exploring the TSA Pipeline Security Guidelines

Under the direction of the Department of Homeland Security (DHS), The Transportation Security Administration (TSA) secures transportation systems in the United States, including oil and natural gas pipelines. The TSA Pipeline Security Guidelines are recommended best practices that protect the over 2.7 million miles of pipelines transporting natural gas, oil, and other hazardous materials across the U.S. from physical and cyber threats.

Understanding the HITRUST CSF and its Benefits

The Health Information Trust Alliance Common Security Framework (HITRUST CSF) is a cybersecurity framework designed to help organizations meet regulatory compliance and risk management needs when dealing with sensitive and regulated data. The HITRUST CSF features a risk-based and compliance approach that integrates various regulations and standards. It also includes certification for compliance validation, providing an additional layer of trust for HITRUST-certified organizations.

An Overview of India's Digital Personal Data Protection Act (2023)

After years of debates, discussions, and negotiation delays, the Central Government of India published its Digital Personal Data Protection Act, 2023 (DPDP) on August 11, 2023. In its last week before being enacted, the Act rapidly passed throughout both houses of Parliament and was ascended into publication by President Droupadi Murmu. India is the 19th country within the Group of 20 (G20) to pass a comprehensive data protection law.

Evaluating & Managing Service Provider Security Risks (in 2023)

If you’re considering partnering with a service provider, it’s essential also to consider the security risks they could introduce to your organization. In this post, we outline the primary cybersecurity risks associated with service providers and provide tips for managing them to help you safely benefit from this strategy for reducing operational costs. Take a tour of UpGuard’s Vendor Risk Management solution >

Choosing a HIPAA Compliance Product in 2023

All covered entities must comply with HIPAA or face fines of up to $50,000 for every violation. However, with such high cybersecurity standards and insufficient implementation guidance, it's not surprising that HIPAA violations are common occurrences. To overcome the challenges of adhering to HIPAA’s stringent safeguards, covered entities are turning to HIPAA compliance software for support.

How we built a secure RDP client

Today’s remote desktop protocol (RDP) clients don’t do enough to promote a strong security posture. They default to weak password-based authentication, leaving Windows infrastructure vulnerable to brute force attacks, and assume a direct connection to a well-known port is available. At Teleport we’re a bit bonkers about always trying to build the most secure solution, so we set out to do something different.

The Top Cyber Attacks of August 2023

There was some good news on the cybersecurity front in August, starting with a joint effort by U.S. and European authorities that broke up a far-reaching network of compromised computers used in attacks on healthcare organizations around the world. The takedown also netted more than $8 million in illicit cryptocurrency from Russian-affiliated hacking groups.

How Much Does it Cost to Get SOC 2?

A commonly asked question about SOC 2 is “How much does a SOC 2 attestation cost?” However, there isn’t a single answer, because the cost depends on multiple factors. The total costs of a SOC 2 audit can range from tens to hundreds of thousands of dollars. In this article, we will see what specific factors influence an audit’s cost, how you can estimate the expense, the cost breakdown, and how you can lower this expense with the help of automation.