Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Privacy and Boundaries in Remote Work: The Webcam Conundrum

As remote work becomes the new normal, the question of privacy and boundaries has taken centre stage. Join us for an engaging discussion on the challenges of webcam surveillance in the digital age. In this video, we share intriguing anecdotes and thought-provoking scenarios that shed light on the delicate balance between oversight and respecting personal space. Discover the story of a colleague juggling work and family life, where a simple shift in perspective led to a crucial realization about safeguarding privacy. We delve into the implications of capturing personal moments on corporate servers and the potential ethical concerns that arise.

2023 OWASP Top-10 Series: API6:2023 Unrestricted Access to Sensitive Business Flows

Welcome to the 7th post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a particular focus on security practitioners. This post will focus on API6:2023 Unrestricted Access to Sensitive Business Flows. In this series we are taking an in-depth look at each category – the details, the impact and what you can do about it.

How to Prepare for a PCI DSS Audit: 7 Key Steps You Should Follow

In the modern world, where financial transactions are increasingly conducted online, ensuring the security of sensitive financial information has become paramount. The Payment Card Industry Data Security Standard (PCI DSS) guides businesses worldwide towards the secure handling of payment card data. Compliance with PCI DSS not only protects your customers from potential data leaks but also safeguards your organization’s reputation and credibility.

7 Ways Security Teams Can Save Time With AI

AI has already revolutionized the way we work. ChatGPT, GitHub Copilot, and Zendesk AI are just a few of the tools that are taking over day-to-day tasks like generating customer support emails, de-bugging code, and much, much more. Yet despite all of these advancements, security teams are under more intense pressure than ever to mitigate rapidly evolving risks. Paired with a growing shortage of over 3.4 million cybersecurity workers, security teams are in need of a solution—and fast.

Exploring the EU Cybersecurity Certification Framework

In 2019, The European Parliament introduced the European Cybersecurity Certification Framework in response to growing cyber threats and the need for more robust cybersecurity measures. These certification schemes were part of the broader cybersecurity policy introduced with the European Union Cybersecurity Act, which boosted cybersecurity measures and cyber resilience across EU member states.

How to Build a Customized TPRM Framework

Third-party risk management (TPRM) is reviewing and mitigating risks associated with outsourcing business operations to third-party vendors or service providers. Risks are varied but include cybersecurity risks like data breaches or reputational risks that affect business continuity. If your organization wants to create a TPRM program or upgrade your current risk management strategy, focusing on customization can be critical in setting your organization apart.

An Overview of ENISA's Risk Management Standards Report

The European Union Agency for Cybersecurity (ENISA) published its Risk Management Standards report on March 16, 2022. The report's primary objective was to produce an organized overview of all published standards that address aspects of risk management. Subsequently, ENISA aimed to describe the various methodologies organizations can use to implement the risk management frameworks it covers.

What are the Cybersecurity Requirements of SEC Regulation S-P?

The United States Securities and Exchange Commission (SEC) enacted Regulation S-P (Reg S-P) in 2000 to safeguard the financial information of consumers. The regulation requires financial institutions to develop written policies to protect customer records and regulate their internal data disposal activities. In March 2023, the SEC proposed amendments to Regulation S-P.