Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Changes to NIST CSF 2.0: GRC Newsflash

At TrustCloud, we’re on a mission to democratize compliance, so we’re kicking off GRC Newsflash – a series where our experts give you a quick rundown on the latest buzz happening in the GRC, security, and privacy world. Today’s edition features our Compliance Specialist Frank Kyazze, and covers updates of the NIST Cybersecurity Framework 2.0, announced on August 8, 2023.

Protecting Local Government Data: Why Password Managers Are Essential

Cyberthreats and ransomware attacks can be crippling for municipalities and county government offices. Local government employees need to access a growing number of systems, applications and databases to perform their duties, while the rise of remote work has drastically increased the attack surface of a typical small government office.

INETCO in the News: Commentary: How Emerging Technologies Can Help Solve EBT Fraud

Ali Solehdin – Digitaltransactions.net – August 11, 2023 Instances of electronic benefits transfer (EBT) fraud have become more prevalent in the United States as criminals become more brazen and increasingly prey on society’s most vulnerable.

How to Enable Logging: Secure Cloud-native Development Series

Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the second part of the series, and it will teach you how and why to enable logging from the start. We’re going to talk about enabling logging (cloud logging, to be specific). What’s the difference? Not much, other than the fact that it’s another managed service integrated with the tools we should already be utilizing.

The Role of Software in Vendor Risk Management Products

In recent years, vendor risk management (VRM) has become a complicated practice as businesses aim to scale and manage potentially hundreds or thousands of vendors. With more vendors, cybersecurity risk is introduced, necessitating software and other digital solutions to adequately manage these vendors. The role of software in vendor risk management products is more important than ever now and moving forward.

LUKB taps Fireblocks to build infrastructure for new crypto trading and custody product

Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, uses Fireblocks to provide the infrastructure for this new digital asset initiative. Read the blog and watch the video. In an era where digital assets are reshaping the landscape of financial services, Luzerner Kantonalbank (LUKB), the leading bank in the Swiss canton of Lucerne, is at the forefront of innovation.

TMX Finance Suffers a Breach Exposing Nearly 5 Million

TMX Finance and related companies are all involved in crisis loans and emergency lending programs. The companies handle financial data for a huge number of individuals throughout the United States, and the different individuals involved with the company could be at risk for this reason. We recently learned that TMX Finance suffered from a data breach that exposed data for nearly 5 million people. News of the breach was just released, but victims may have been exposed for months now.

Why Cybersecurity Is So Valuable for Small Businesses

Cybersecurity is extremely valuable for small businesses because it keeps their data secure, improves employee productivity, helps protect their reputation, aids in legal and regulatory compliance, and is cost-effective. Read on to learn more about the value of cybersecurity for small businesses and cybersecurity best practices your business can start implementing today.

The Case for Single-Tenant SaaS for IGA

More and more organizations are moving towards a cloud-first strategy where they look to move their on-premises applications to SaaS offerings. This is especially true for customers looking to streamline their on-premises Identity Governance and Administration (IGA) application via a move to the Cloud.