Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

PCI Compliance Done Right with Splunk

The New Year brings with it so much to look forward to and we are happy to bring even more to be excited about: a new release for the Splunk App for PCI Compliance. Starting January 11th, version 5.1 will be Generally Available. In this blog, let's review the main benefits of the Splunk App for PCI Compliance and highlight the improvements that version 5.1 brings.

Do you need penetration testing for compliance?

A lack of compliance is increasingly becoming a major barrier for sales, forcing security directors to be more in tune with their organization’s revenue and growth goals than ever before. To help ease this pressure, companies are seeking to fulfill compliance requirements faster. ‍ In this article, we’re deep diving into the two most common security testing options that companies employ for their compliance initiatives: penetration testing and vulnerability scanning.

Improve the compliance and security posture of your Google Cloud environment with Datadog

Organizations are scaling their environments at a rapid pace, deploying thousands of cloud resources, services, and accounts. Because of their size and complexity, these environments are more susceptible to compliance issues—a misconfiguration in a single cloud resource can lead to costly data breaches. For that reason, organizations are prioritizing governance, risk, and compliance (GRC) management to ensure that their environments are configured appropriately.

What to Do If You're Unprepared for a SOC Audit

The System and Organization Controls, or SOC (sometimes referred to as service organizations controls), are the required security control procedures set as non-mandatory, internationally-recognized standards that help businesses measure how SaaS companies and service organizations manage data and sensitive information. Organizations or businesses that have successfully passed the SOC auditing process can attest to the quality of their security controls for regulating customer data.

How Machine Learning as a Service improves organizational productivity and reduces costs

85% of Machine Learning (ML) projects fail. This stark reminder from Gartner – despite more tools being available to businesses than ever. The thing is ML success is not just about tools and technology; it’s about how they’re put into production by experts. Plural. Machine Learning – that improves productivity and profitability by finding valuable insights buried deep in your company databases – needs a small army to leverage it.

Compliance for SMEs: What you need to know

For ensuring compliance in your business practises, it is worth noting that it is just as common (if not more common) for bad actors to target small businesses and small-to-medium-sized enterprises (SMEs). A website can easily get hacked, an email account can be compromised, and sensitive information may even be stolen by employees. These are just a few common examples of how data can be breached.

How to Stay Compliant with HIPAA Password Requirements

The Health Insurance Portability and Accountability Act (HIPAA) is U.S. legislation that sets national privacy and security standards to protect the privacy of patient health information and prevent data breaches. In addition to doctors, hospitals, other healthcare providers, health insurance companies and “business associates” of healthcare organizations fall under HIPAA regulations.

Case study: How Mulligan Funding built a SOC 2-compliant fintech SaaS platform with Calico Cloud

The rise of fintech has pushed traditional financial institutions to provide online-based services and launch fintech applications. But these services must be secure and meet certain regulatory requirements, such as the Payment Card Industry Data Security Standard (PCI DSS), the General Data Protection Regulation (GDPR), or SOC 2.

What is an access review?

An access review describes the process of monitoring the rights and privileges of everyone who can interact with data and applications. This includes management of personnel, employees, vendors, service providers, and other third parties that your organization has been involved with. ‍ Also known as entitlement review, account attestation, or account recertification, access reviews are essential to the management, monitoring, and auditing of user account lifecycles.

VI Achieves SOC2 -Type1 Certification For Managed Security Services

VodafoneIdea Limited, a leading Indian Telecom Operator has successfully achieved SOC2 Attestation. After undergoing a rigorous auditing process, VodafoneIdea achieved SOC2 Attestation from VISTA InfoSec, a well-known Global Cybersecurity Consulting, and Certification organization. The SOC2 Audit and Attestation is an assessment of internal controls and security practices conducted by the independent auditors of VISTA InfoSec.