Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Are The IRS 1075 Safeguards Audit Requirements?

When you think about an IRS publication, you’re probably thinking about the complex forms you need to fill out, usually relating to taxes. That’s not all the IRS publishes, though, and one of the more important documents they maintain is called Publication 1075. When it comes to sensitive information for everyday Americans and private sector businesses, there’s very little more important and more sensitive than tax information.

Access Governance: How to Track Access, Approvals, and Revocation with Audit Logs

As organizations continue to adopt more SaaS applications, managing access across those systems has quietly become one of the most complex operational challenges for IT teams. Identity providers, collaboration tools, cloud platforms, and business applications all have their own access models, their own admins, and their own ways of tracking permissions. In most organizations, there still isn’t a truly streamlined or automated way to handle access end to end.

How to Choose and Hire a QSA for Your PCI DSS Audit

You only really get to influence your PCI-DSS audit in two places: how you design your controls, and who you let judge them. QSA selection is the second one, and it’s usually underestimated relative to how much it shapes your next 3–5 years. Under PCI DSS 4.0.1, the assessor’s judgment matters more because several requirements move the discussion into client-side behavior. Scripts, page changes, and third-party components now factor into how compliance is validated.

Investigate Amazon EKS Audit Logs with Teleport Identity Security

In Teleport 18, we’ve added official support to import Amazon EKS Audit Logs into Teleport Identity Security. This capability allows teams to have visibility into actions performed on Amazon EKS clusters when those actions were not executed via Teleport. Amazon EKS Audit Logs in Teleport Identity Security will be generally available in Teleport 18.3, coming November 2025. Your browser does not support the video tag.

How Physical Asset Security Strategies from Cybersecurity Apply to Gold Bullion Storage

The parallels between protecting digital assets and physical gold bullion reveal a fundamental truth about modern security architecture: threats evolve, but the principles of defense remain constant. Organizations safeguarding high-value physical assets can extract substantial operational advantage by adopting frameworks originally designed for cyber defense. This convergence of physical and digital security thinking represents a strategic shift in how enterprises approach asset protection.

The Compliance Gap: How Untracked User Lifecycle Changes Create SOC 2 Audit Failures

Forty-seven ghost accounts cost one SaaS company a $2M deal. Their SOC 2 auditor flagged a critical issue: former employees still had active system access, even those terminated six months earlier. The security team invested heavily in firewalls, encryption, and penetration tests. They failed on something more urgent: proving immediate access removal when people left.

Why auditor choice matters more than you think | Heard in the founder chat

Some things in startup life are just for show—job titles, swag drops, maybe even your first “launch.” Your auditor? Not one of them. In this episode of Heard in the Founder Group Chat, Jadee Hanson, Vanta’s CISO, breaks down why your auditor is more than a checkbox — they’re your external seal of trust.

10 Common Vulnerabilities Found During Software Audits - and How to Fix Them

A software audit is not a checklist but a thorough examination into the internal workings of your system that lurking vulnerabilities are usually hiding. Thousands of breaches every year are due to organizations not paying early attention to software audit vulnerabilities that might have been noticed and eliminated at an early stage. This article exposes the top ten vulnerabilities that are oftentimes encountered during software audits, why they occur, and offers some remediation measures that can be taken.

ISO 27001 Audit Record Retention Requirements

As one of the most common information security frameworks in the world, ISO 27001 is used by tens of thousands of organizations worldwide. That means it has to fit a lot of different groups with a lot of different needs. It also means that there’s a lot of information pertaining to ISO 27001 within each of those companies. Data like the logs of access control systems, the chain of custody for sensitive information, and the results of audits are all stored somewhere.