Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

HIPAA and Incident Response: How to Manage Security Incidents in a HIPAA-Compliant Environment.

Watch our webinar on “HIPAA and Incident Response: How to Manage Security Incidents in a HIPAA-Compliant Environment” for an amazing opportunity to learn about HIPAA and incident response in a HIPAA-compliant environment! VISTA InfoSec presents this informative session for organizations striving to achieve HIPAA compliance and enhance their incident response capabilities.

Who is Mend.io

Mend.io (formerly WhiteSource) is the leader in application security. Mend uniquely removes the burden of application security, allowing development teams to deliver quality, secure code, faster. With a proven track record of successfully meeting complex and large-scale application security needs, the world’s most demanding software developers rely on Mend. The company has more than 1,000 customers, including 25 percent of the Fortune 100, and manages Renovate, the open source automated dependency update project.

Webinar How Does NIST 800 171 R3 Impact Your CMMC Plans

Let’s avoid confusion and not lose focus. While NIST recently announced revision 3 of 800-171, its impact on government contractors and subs won’t be felt for years. DFARS 252.204-7012 requires compliance with Revision 2 now. SPRS scores (which can now be considered by the government when making contract awards) are based on Revision 2, and CMMC assessments which will soon be required are also based on Revision 2.

Code delivery in a DevSecOps way through automation and security - GitProtect & Mergify

Fewer engineers, more and more updates and milestones, competition velocity... - all of this makes DevSecOps seem complicated and costly. While security might be considered a bottleneck to faster releases, growing cyber threats and developers' mistakes makes it much too risky to minimize or ignore. In this webinar recording experts from GitProtect and Mergify join forces to prove to you that code delivery in a DevSecOps way doesn't have to be complicated 🚀

TrustCloud Releases World's First Free Security Questionnaire Tool and Compliance Sharing Portal for Startups

TrustShare™ application includes AI-powered security questionnaire responses and a dynamic compliance portal, so startups can pass security reviews and win crucial enterprise deals.

What is retargeting and how can you use it?

Retargeting is a powerful advertising technique that allows brands to reach out to potential customers who have previously interacted with their website or mobile app. It works by using cookies to track users' online behaviour and display to them targeted ads on various websites and social media platforms. Read on and find out how you can use retargeting in your business.

Frequently Asked Questions on the 2023 EU General Court's Pseudonymised Data Ruling

In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as well as the opportunities this new ruling may offer when transferring and accessing data across borders..

Bringing IT & OT Security Together, Part 2: BAS and the Purdue Model

In our first post on using BAS in an operational technology (OT) environment, we provided an overview of a typical converged IT/OT network, the trends that were driving increased cyber risk for industrial asset owners, and a high-level discussion of how BAS can help provide better visibility and protection across the converged environment.

Leveraging XDR to Build Stronger Managed Services

XDR (eXtended Detection and Response) is a leading integrated cybersecurity approach, which improves threat detection and response through integrating multiple data sources and cybersecurity tools and unifying multiple security products into a single operating system. XDR technology is growing increasingly popular. And it’s an opportunity for managed service providers (MSPs) to scale and grow their business.

Risk-based Vulnerability Management: A Bigger Bang for Your Buck

Every five to ten years, major technology shifts change the way that vulnerability assessment and the related IT risk mitigation processes are approached or implemented. What has remained constant is the formula we use to measure risk and thus prioritize and triage vulnerabilities. Risk = (Likelihood of event) * (Impact of consequences) It’s an approach that intuitively makes sense, but there have been two challenges with how this formula has been applied.