Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Choosing Security Questionnaire Automation Software (in 2023)

Your security questionnaire workflow is the litmus test for the efficiency of your overall Vendor Risk Management program. If this pipeline gets congested, all of the VRM processes, depending on it, get disrupted, which impacts your security posture and heightens your risk of suffering a third-party data breach.

16 Hospitals Lose Data in Prospect Medical Holdings Breach

Prospect Medical Holdings is an umbrella company with over 16 separate hospitals throughout Pennsylvania, California, Rhode Island, and Connecticut. The company manages a huge amount of information between all those different hospitals, and all that data could easily be misused if the wrong individuals accessed it. Prospect Medical Holdings was recently the victim of a data breach, though the company itself did not announce that information to the world.

What Makes a Strong Password?

A strong password is made up of at least 16 characters and contains upper and lower case letters, numbers and symbols. Strong passwords also follow password best practices so they never contain personal information, dictionary words or phrases, and are never reused across multiple accounts. Continue reading to learn why strong passwords are necessary and tips for creating a strong password.

"Flying Under the Radar:" How to Protect Your Organization's Reputation

Over 72 percent of Indian citizens think their personal data has been compromised, according to a recent article in Business Today. They blame a variety of organizations and institutions, which is understandable. Now imagine your organization is the one to blame. Could your company survive this type of hit to its reputation? Would it be able to retain customers who no longer trust you to keep their sensitive information secure?

Becoming FedRAMP and StateRAMP Authorized, Part 2 - Common FedRAMP Mistakes You Can Avoid

August 31, 2023 By Isac Hur, Senior FedRAMP/ StateRAMP/ CMMC Practice Lead and Quality Assurance As a compliance auditor and practitioner in the FedRAMP space, I see a lot of mistakes cloud service providers (CSPs) make that cause them a tremendous amount of grief when seeking authorization. The process is painful enough on its own, but many of the people you hear venting frustration have made missteps.

Tips and Tools for Open Source Compliance

You don’t need us to tell you that open source software is becoming a very significant percentage of commercial software codebases. Open source components are free, stable, and enable you to focus your resources on the innovative and differentiated aspects of your work. But as the use of open source components increases, compliance with open source licenses has become a complex project of growing importance. So how can you stay on top of compliance and what tools are out there to help?

Understanding the Principle of Least Privilege in 2023

The principle of least privilege is a crucial element in keeping data secure from malicious users and cyberattacks. This concept puts restrictions on access rights so that only necessary privileges are provided to applications, systems, and users for them to carry out their duties. By incorporating this measure into various platforms/environments, it greatly reinforces cybersecurity as well as the protection against unauthorised use or misuse of information.

Insights at Your Fingertips: Ekran System's Dashboards Update

Our team is constantly working on improving the experience for our customers and their end users. We are happy to announce that Ekran System has updated its Management Tool dashboards to make them even more well-structured and user-friendly. Read this five-minute post to discover our new dashboards.