Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NIS2: A Roadmap to Compliance

The deadline for European Union member states to pass the new EU NIS2 regulation into national law was October 17, 2024, yet only a few countries have transposed it into law, leaving others lagging behind, with regulations in draft or public consultation phases, or not at all. In the absence of certainty for firms (or what NIS2 calls entities), confusion is understandable, but steps can be currently taken considering what we already know.

Who needs to comply with DORA? All your questions answered

The Digital Operational Resilience Act (DORA) has been developed to protect the financial sector, which is particularly vulnerable to cyberattacks. According to the IMF’s 2024 Global Financial Stability Report, the number of cyberattacks has progressively increased since 2004, and nearly 20% of these attempts target financial institutions. DORA serves as a regulatory measure in the European Union (EU) to improve cybersecurity and operational resilience of organizations in the financial sector.

Building a smarter retrieval system: Lessons from Vanta AI

At Vanta, we power a suite of AI products that enable thousands of customers worldwide to make critical business decisions. These products rely on the ability to quickly search through millions of customer documents to surface relevant information and drive accurate outcomes. ‍ Building a retrieval system capable of handling this scale and complexity was no small feat. Along the way, we learned valuable lessons that we’re excited to share.

Building a Sustainable PCI DSS 4.0 Compliance Culture

The Payment Card Industry Data Security Standard (PCI DSS) has long been recognized as the gold standard for payment security, establishing rigorous protocols for organizations that handle credit and debit card data. Designed to bolster defenses and minimize the risk of costly data breaches, PCI DSS is now poised for a major evolution. With the introduction of PCI DSS 4.0, new compliance requirements will become mandatory starting March 31, 2025.

How does DORA impact UK entities: Key implications to consider

The Digital Operations Resilience Act (DORA) is a new regulation aimed at improving the cybersecurity and operational stability of the EU's financial sector, especially regarding risks related to information and communications technology (ICT). It applies to organizations in the financial industry, requiring them to reassess and adapt their security posture to DORA’s stringent requirements.

The Dangers of Outdated Social Media Content

Social media now forms a crucial part of the daily operations of our existence. The social media platforms Facebook, Instagram and Twitter enable users to distribute life updates together with pictures and video content to their social network. User activity on social media leaves virtual records of life history that exist digitally without any set expiration date. Unmanaged old social media content creates multiple risks that affect both reputation and professional standing, as well as legal compliance.

PCI DSS 4: Compliance Guide for SAQ A-EP Merchants to comply with Requirements 6.4.3 and 11.6.1

As an SAQ A-EP merchant, you face unique compliance challenges because you control elements of your payment page, even though you don’t directly process card data. This makes you a prime target for attacks like Magecart, which specifically target payment page scripts.

Mastering audit scope: A strategic imperative for technology leaders

As part of the technological revolution, organizations must navigate complex regulatory landscapes, safeguard data integrity, and ensure operational efficiency. Central to these endeavors is the meticulous scoping of audits, a process that delineates the boundaries of examination, ensuring that audits are both effective and aligned with organizational objectives.

Mastering audit scope: A strategic imperative for technology leaders

As part of the technological revolution, organizations must navigate complex regulatory landscapes, safeguard data integrity, and ensure operational efficiency. Central to these endeavors is the meticulous scoping of audits, a process that delineates the boundaries of examination, ensuring that audits are both effective and aligned with organizational objectives.

The risks of waiting on compliance

Startup founders constantly face competing demands as they build and scale their businesses. Engineering, product design, and sales all have legitimate claims to be the most urgent priority and sole focus of attention. ‍ These pressures lead many founders to defer security and compliance investments until later. With small teams and limited financial resources, founders top priorities are building their product and acquiring their first customers.