Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

ISO 27002: Information Security Controls Explained

In the race to execute digital transformation strategies, the rear-view mirror never fails to shake off the looming cyber threats that are a significant stumbling block to any organizational objectives. Today, nearly 48% of organizations are experiencing more cyberattacks than the previous year.

Vulnerability A03 : Injection - OWASP TOP 10

Welcome to our latest video on the OWASP Top 10, focusing on Vulnerability A03: Injection. This video is designed to provide a comprehensive understanding of injection vulnerabilities, which are among the most common and dangerous security risks in web applications. In this video, we will explore the concept of injection vulnerabilities, their various types, and how they can be identified. We will also look at real-world examples to illustrate the potential impacts of these vulnerabilities when they are exploited.

SOC 1 vs SOC 2: Everything you need to know about the SOC attestations

Service organizations often undergo SOC (Service Organization Control) attestation to assure clients and stakeholders of the effectiveness of their internal controls. Two prominent frameworks within the SOC domain are SOC 1 and SOC 2, each designed to address specific facets of a service organization’s controls. Read on to learn how to compare SOC 1 vs SOC 2 attestations.

Safeguarding Sensitive Data: The Vital Role of Cybersecurity in Business Law Firms

In an era marked by digital transformation and increasing reliance on technology, cybersecurity has become a critical concern for businesses across all sectors. However, for law firms specializing in business law, the need to protect sensitive client information and maintain confidentiality is paramount. As custodians of highly confidential data, including intellectual property, financial records and sensitive legal documents, business law firms face unique cybersecurity challenges and must implement robust measures to safeguard against cyber threats and data breaches.

Navigating Authority to Operate: FISMA or FedRAMP?

Navigating Authority to Operate: FISMA or FedRAMP? Decades ago, the government stood on its own. While it would often contract out with individuals and companies for services, there was always a barrier between third-party operations and government operations to prevent intrusion, infiltration, or compromise. Over the years, though, society has grown more and more complex.

Xalient achieves ISO 27001:2022 Recertification

In a significant achievement, we are thrilled to announce our successful transition to the ISO 27001:2022 standard whilst also undergoing recertification. This recertification is the pinnacle of Information Security Management. The recognition by BSI in December 2023, with auditors acknowledging our commitment as “up there with the best of them,” underscores our dedication to providing the highest level of service to our customers.

Customer Corner: How Apree Health Gained Container Visibility and Achieved Compliance

Join David Quisenberry, Senior Manager of Information Security, and Cat Schwan, Security Team Lead, to learn how Sysdig’s powerful runtime insights empower Apree Health to identify, visualize, and eliminate Kubernetes vulnerabilities, threats, and misconfigurations in real time, and how automated evidence gathering and reporting helped them achieve both SOC 2 and HITRUST compliance. Interested in learning more about Sysdig Secure?

Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

Welcome to Razorwire, the podcast dedicated to exploring the complex and evolving world of cyber security legislation. I'm your host, Jim, and in today's episode, we delve into the intricate landscape of cyber security legislation with our guests Steve Applegate and Phil Tonkin from Dragos.

Cybersecurity in the Age of Regulation

Cybersecurity breaches are becoming more frequent and more impactful. Adversaries continue to grow stronger, and defenders aren’t always keeping pace. Add in the increasing number of nation-state actors in the threat landscape, and it’s hardly surprising that governments are starting to take a greater role in regulating security. On July 26th, 2023, the U.S.