Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's the Cheapest Way to Comply with HIPAA Online Tracking Technology Rules?

The U.S. Department of Health and Human Services (HHS) clarified in 2022 and again in 2023 that tracking technologies like Meta Pixel and GA4 can expose Protected Health Information (PHI). This applies even if PHI isn’t explicitly shared—contextual data such as appointment searches or logged-in status on a patient portal can qualify.

Ransomware Strikes : The Final Conclusion (Part 4)

Moving into the Final Chapter of Our Ransomware Series! You've made it through the critical first hour—great job! Now, the real work begins. In this video, we go into the after effects and solutions to what happens after the initial containment, including the importance of a solid Incident Response Plan, whether to pay the ransom, engaging experts, and the crucial steps to recover and harden your defenses.

Continuous audit readiness: Multi-frame compliance for strategic advantage

Navigating the business environment calls for a proactive approach to risk management—particularly through continuous audit readiness. This strategy not only assures compliance across multiple frameworks, but it also drives operational efficiency, protects brand reputation, and supports strategic decision-making initiatives.

DORA and NIS 2: Regulatory Compliance as a Competitive Advantage for MSPs

The evolution and growing impact of cyberthreats are increasingly impacting the economic and social fabric. From attacks on business infrastructures to political disinformation campaigns and ransomware targeting critical environments such as hospitals or transportation networks, the impact is no longer just technical; it’s systemic.

Who Owns CMMC Evidence Collection in a Small Business?

The Cybersecurity Maturity Model Certification, CMMC, is a critical part of ensuring robust and equal information security from top to bottom throughout the Department of Defense’s supply chain. A common misconception about CMMC, stemming from previous pre-CMMC security, is that it primarily applies to prime contractors and big businesses.

Streamline audit workflows with the Vanta + Fieldguide integration

Audits are hard enough. Chasing down duplicate evidence across systems shouldn’t be part of the process. We’re excited to announce we’ve joined Fieldguide’s open ecosystem, the industry-leading AI-powered platform built for top global CPA firms and enterprise-focused audit providers. ‍ This integration is designed to reduce friction, eliminate redundant work, and help both companies and auditors complete reviews more efficiently with streamlined communications.

Essential Eight framework: A comprehensive guide to compliance

In 2010, the Australian Signals Directorate (ASD) developed a set of prioritised threat mitigation strategies to provide cybersecurity guidance to government agencies and organisations. Over time, eight of those strategies proved to be the most effective and were formalised into the Essential Eight (E8) framework, officially published in 2017.

The Superior Long-Term Investment for Municipal Planners: Solar Street Lights or Traditional Systems?

Smart, green infrastructure is becoming the norm for municipalities across the globe, and public lighting is one of its critical components. Solar street light systems are becoming increasingly popular as a cost-effective and sustainable solution compared to traditional street lighting systems. For municipal planners, the decision of choosing between both technologies is extremely important in terms of long-term returns on investments.

DORA Non-Compliance Could Cost Your Business

Prompted by a new era of cyber-attacks surging downtime and data breaches, the Digital Operational Resilience Act (DORA) regulation came into force on 17th of January to reshape how organisations approach security, privacy and cybersecurity. Cybercriminals are becoming increasingly daring and creative, with an expected rise in the exploitation of new vulnerabilities in 2025.