Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

NIS2 Directive and cyber risk management

The NIS2 Directive, published in December 2022, sets out a series of measures for improving cyber risk management throughout the European Union. All EU member states must apply the Directive as part of national law by October 2024. By the same date, all applicable organizations must comply with the measures set out in NIS2.

What is TX-RAMP? Full Compliance Guide

TX-RAMP (Texas Risk and Authorization Management Program) is a cybersecurity program that was modeled after the similarly named FedRAMP and StateRAMP programs to ensure that cloud computing services that work with federal or state agencies have adequate security controls in place. TX-RAMP was created by the Texas Department of Information Resources (DIR) to provide a method to review the security measures taken by cloud-based products and services that process and transmit data to Texas state agencies.

Forward Networks Achieves SOC 2 Type 1 Compliance, Demonstrating Commitment to Transparency and Data Security

Forward Networks announces it has successfully achieved System and Organization Controls (SOC) 2 Type 1 Compliance. The completion of the audit demonstrates Forward Network's commitment to transparency, privacy, and data security for customers.

ISO 27002 puts Threat Intelligence center stage

The ISO 27000 series is an industry standard that has long defined and dictated base-level requirements for organizations’ information security management systems (ISMS). Through more than a dozen standards, the framework helps organizations demonstrate management commitment to their ISMS as they regularly review and improve their systems and procedures.

Connect any app to Vanta with Private Integrations

We’re thrilled to announce the launch of Private Integrations today, enabling Vanta customers to easily connect their in-house or third-party applications to Vanta’s Trust Management platform. With Private Integrations, in-house systems that need compliance controls can now be managed with the same level of automation as any third-party application available in Vanta’s integration directory.

Compliance? WhiteHat Dynamic has you covered

WhiteHat™Dynamic delivers the compliance testing you need, without slowing down development. Your business runs on an ever-changing combination of software you build, software you borrow, and software you buy. Of course you need run your business at the speed of software, but these ever-changing apps and systems can contain vulnerabilities that can be exploited to disrupt, threaten, and steal essential data.

How to Quantify the ROI of Your GRC & Security Programs: 3 Lessons Learned from Successful GRC Teams

GRC programs are often viewed as cost centers. But, they can in fact be profit drivers by contributing to sales acceleration, cost and time savings, and risk reduction. In this session, we shared insights on calculating the ROI of GRC, by connecting to key metrics like contractual liability, resource costs, and operational efficiency. We also provided practical examples of how to gauge program success.

What Are the Types of Audit Evidence?

The collection and evaluation of audit evidence plays an important role in assessing an organization’s compliance with established standards. The American Institute of Certified Public Accountants (AICPA) serves as a guiding force, establishing methods that auditors should use to carry out their duties effectively. As auditors start their examination, they first collect and analyze various types of audit evidence, each serving as a piece of the puzzle that forms the auditor’s report.

What is the Texas Data Privacy and Security Act (TDPSA)?

The Texas Data Privacy and Security Act (TDPSA) was enacted on June 18, 2023, making Texas the tenth U.S. state to authorize a comprehensive privacy law that protects resident consumers. The TDPSA borrows many statutes from other state privacy laws, mainly the Virginia Consumer Data Protection Act (VCDPA) and the California Consumer Privacy Act (CCPA).