Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance

What Are the Types of Audit Evidence?

The collection and evaluation of audit evidence plays an important role in assessing an organization’s compliance with established standards. The American Institute of Certified Public Accountants (AICPA) serves as a guiding force, establishing methods that auditors should use to carry out their duties effectively. As auditors start their examination, they first collect and analyze various types of audit evidence, each serving as a piece of the puzzle that forms the auditor’s report.

What is the Texas Data Privacy and Security Act (TDPSA)?

The Texas Data Privacy and Security Act (TDPSA) was enacted on June 18, 2023, making Texas the tenth U.S. state to authorize a comprehensive privacy law that protects resident consumers. The TDPSA borrows many statutes from other state privacy laws, mainly the Virginia Consumer Data Protection Act (VCDPA) and the California Consumer Privacy Act (CCPA).

APRA CPS 230: Compliance Guide for Australian Finance Entities

CPS 230 will disrupt vendor relationships for Australian financial institutions by giving APRA greater authority over service provider arrangements when prudential concerns are heightened. If you’re an APRA-regulated entity, this post will help you understand the requirements of CPS 230, how the new standards differ from SPS 231 and SPS 232, and how to achieve compliance standards by the full compliance deadline of 1 July 2025.

Vanta Names Enterprise Saas Leader Jeremy Epling As Chief Product Officer

Vanta announces it has appointed Jeremy Epling as its Chief Product Officer overseeing engineering, product and design, reporting directly to Vanta's CEO Christina Cacioppo. Epling is the second C-Suite executive to join Vanta's leadership team this year with David Eckstein coming onboard in January as Chief Financial Officer.

How to start a security compliance program

Security compliance programs help your organization identify, implement, and maintain appropriate security controls to protect sensitive data, comply with laws and contractual obligations, and adhere to the standards, regulatory requirements, and frameworks needed to protect customers and enable the business to succeed. ‍ In other words, with a security compliance program in place, companies are able to demonstrate that they meet designated security requirements and objectives.

What is the CMMC (Cybersecurity Maturity Model Certification)?

The Cybersecurity Maturity Model Certification (CMMC) is a US Department of Defense (DoD) certification framework that aims to protect sensitive information handled by Defense Industrial Base (DIB) contractors by establishing a set of cybersecurity standards and best practices to follow. DIB partners often handle critical DoD information and other government data to operate, which typically has various levels of sensitivity and classification.

Continuous Monitoring for Real Time Compliance

The increasing number and sophistication of data breaches has led to increased concern among boards, regulators, and the public about threats to the data environment. That, in turn, has led to a desire for constant data protection – and a rise in the importance of continuous compliance monitoring to be sure that those data protection efforts are always sufficient and working.