Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RegScale's Travis Howerton on taking the pain out of compliance in highly-regulated industries

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Travis Howerton, Co-founder and CEO of RegScale. Travis began his security career with roles at government and regulated organizations, including the National Nuclear Security Administration and Oak Ridge National Laboratory, before being inspired by inefficiencies in compliance processes to co-found RegScale.

IoT & PCI DSS : Addressing Security Risks

Over 50% of IoT devices have critical vulnerabilities hackers can exploit RIGHT NOW! 1 in 3 data breaches now involves an IoT device. If your IoT devices touch cardholder data, they're squarely in your PCI DSS scope – and a major security risk. Are you unknowingly exposing your payment systems to new cyber threats? We will have a glimpse at the critical intersection of IoT and PCI DSS, revealing how to secure your connected devices and protect sensitive cardholder data from evolving attacks.

The Impact of continuous control assurance on audit readiness

Owing to the rapidly evolving regulatory and operational landscape, organizations are increasingly focused on ensuring that their internal control frameworks are both resilient and adaptive. Continuous control assurance (CCA) plays a pivotal role in enhancing audit readiness, enabling companies to maintain robust compliance standards while minimizing disruption to their routine operations.

5 must-haves in your first security hire + [Job posting Template]

Bringing on your first cybersecurity professional is a major milestone for any growing business. This strategic hire signifies that your company recognizes the increasing risks that come with growing your business and is committed to protecting and building trust with your customers. Because this is such an important role, knowing when to make this hire and how to find the ideal candidate is crucial. ‍

Minimize Cybersecurity Threats by Making Smart Hosting Choices

Avoid hosts with vague policies, poor support, or unrealistically low prices, as these can signal serious security gaps. When you think about protecting your website from cyber threats, your first thought probably isn’t your hosting provider. The typical go-to solutions are firewalls, strong passwords, and two-factor authentication. But the truth is, your hosting environment is one of the most overlooked yet critical components of a strong cybersecurity strategy.

DoD SPRS Scores: How Often Should You Update Them?

The overall defense industrial base is growing increasingly aware of the needs of modern information and cyber security. From recent major supply chain attacks to the constant threat of nation-state actors trying to compromise systems, it’s important to be committed to the best security you can implement, no matter where you are in the supply chain. One of the tools provided to you, and required by the Defense Federal Acquisition Regulation Supplement, is the SPRS.

Reducing security review time with AI workflows

In the fast-paced world of modern business, security processes have become a cornerstone of an organization’s risk management strategy. As companies navigate increasingly complex threat landscapes, the pressure mounts to enhance security while keeping pace with business innovation. Integrating artificial intelligence (AI) into security review workflows is emerging as a practical solution to reducing review times, lowering costs, and improving system reliability.

SWIFT Security Controls:Best Practices for Financial Institutions

SWIFT, the global backbone for secure financial messaging, plays a critical role in enabling fast and reliable cross-border transactions. But as cyber threats grow more advanced, financial institutions must implement robust SWIFT security controls to safeguard their systems and prevent fraud. The SWIFT Customer Security Programme (CSP) was established to enhance cybersecurity hygiene across its network, helping institutions protect against fraud and cyberattacks.