Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vodafone Idea has achieved PCI DSS 4.0 Certification.

Telecom Service Provider Vodafone Idea Limited (VIL), announced that it had become the first telco in India to achieve the Payment Card Industry-Data Security Standard version 4.0 (PCI DSS 4.0) certification for its retail stores and payment channels. The PCI DSS 4.0 certification is already mandated by RBI Guidelines for banking and financial institutions in India.

What is NIST 800-53?

Imagine compliance is like a driving application. You know your location and you plug in the destination address, then it shows you the route’s overview. If you want a more specific map, you can zoom in a bit and get more details. Similarly, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) and it’s most recent revision provide the overview roadmap for your compliance journey.

When Is ISO 27001 Considered Mandatory? 5 Examples

ISO 27001 is the international standard for information security and protection. It’s roughly equivalent to similar infosec frameworks in the United States, like FedRAMP and CMMC, but the international development, maintenance, and scope of the ISO framework makes it much more commonly seen outside of US Government contracting. In the US, it’s clear that a security framework mandated by the government is required when working as a contractor for the government. What about ISO 27001?

UpGuard Expands Vendor Risk Questionnaire Library with New DORA Questionnaire

UpGuard is excited to announce the latest addition to our Vendor Risk Questionnaire Library: the DORA (Digital Operational Resilience Act) questionnaire! The addition of DORA to the Questionnaire Library reflects UpGuard’s ongoing commitment to providing our customers with the necessary tools to navigate today’s evolving regulatory standards.

De-identification under HIPAA: 5 Frequently Asked Questions about De-identified Healthcare Data

The Health Insurance Portability and Accountability Act (HIPAA) safeguards patient data. Hospitals, clinics, insurance providers, and other healthcare facilities must adhere to these stringent rules. De-identification enables healthcare data to be used in meaningful research. It enables data to be analyzed to provide improved healthcare. It does this without violating personal privacy. This balance is critical to fuel innovation and ethically manage data.

Essential Guide to Seamless CCaaS Implementation

As businesses continue to evolve in their customer service strategies, Contact Center as a Service (CCaaS) solutions have emerged as an effective tool for enhancing customer experience. These cloud-based platforms offer flexibility, scalability, and access to advanced technologies, making them a popular choice for organizations of all sizes. However, transitioning to CCaaS requires careful planning to ensure a smooth implementation process.

A Quick Guide to Today's Cybersecurity Landscape

The world can be just as much of a marvelous place, as it can be a dangerous one. And the same can be said about the online one, where you need to focus on your safety just as much but in a different way. For those wondering how to approach this, make sure to keep reading as we’ll be covering everything you need to know about cybersecurity.

Why DORA Is a Game-Changer for Financial Services

In this episode of CISO Conversations: EU Data Regulations, Richard Cassidy, EMEA Field CISO at Rubrik, is joined by Anna Delaney, Director of Productions at Information Security Media Group (ISMG), to explore why the Digital Operational Resilience Act (DORA) makes operational resilience a priority for financial services organizations. They discuss how DORA will impact your financial institution, how to best prepare for DORA and improve operational resilience, and how to increase oversight and accountability of third parties in the supply chain.