Is Atlassian Cloud HIPAA Compliant?

In 2021, digital transformation has accelerated. At the tail end of the COVID pandemic, with companies remaining remote, the demand for cloud services in the enterprise is the highest It’s ever been. Healthcare organizations, which more directly encountered the acute challenges posed by the pandemic, were among the first to be shaped by the current wave of digital transformation.

Threats targeting Kubernetes and Defences

Attackers are continuously evolving their techniques to target Kubernetes. They are actively using Kubernetes and Docker functionality in addition to traditional attack surfaces to compromise, gain required privileges and add a backdoor entry to the clusters. A combination of Kubernetes security and observability tools is required to ensure the cloud infrastructure monitoring and lockdown and to enable DevSecOps teams with the right tools for the job.

Top 10 Australian Cybersecurity Frameworks in 2021

If you're an Australian business and confused about which cybersecurity frameworks you should be complying with, you're not alone. Unlike the United States, Australia currently doesn't have clear mandatory minimum cybersecurity standards for businesses. This is likely to change in the near future. The Australian government is being pressured to follow the United State's lead in lifting the Nation's security posture.

3 Ways Egnyte is Helping Construction and Engineering companies Tap into the Power of the Public Cloud (and How)

90% of companies are on the cloud (Galov). That includes industries historically slow to adopt new technology, like Architecture, Engineering and Construction (AEC). However, recent economic and workplace disruptions have pushed AEC firms more aggressively into the public cloud waters - looking for cost effective ways to access compute power, more efficiently process data, provide access to files and applications, and tap into advanced analytics to draw insights from and manage data.

Not All CASBs Are Created Equal. How Do You Choose?

Software as a service (SaaS) apps have reshaped the way we stay productive. By having everything easily accessible in the cloud, we are able to get work done from anywhere and on any device. But, as we know, this flexibility has also introduced security challenges, as your data is also easier to reach for malicious actors. This is why the purchase of a cloud access security broker (CASB) is never that controversial. Most organizations understand that cloud apps require additional protection.

Spring Launch 2021: See Risk | Solve Problems | Report Results

Security leaders are facing a trifecta of challenges: more sophisticated and frequent cyber attacks, expanding regulations and government mandates, and organizational leaders seeking risk management assurances. CISO’s SecOps and VRM teams need complete visibility to threats across their entire attack surface, with insights to take immediate action, and timely reporting for key stakeholders. SecurityScorecard empowers you to see and understand cybersecurity risk in your organization and across your ecosystem with 360° visibility and seamless workflow integration with your security stack.

The PCI DSS Series - Beginning at the End

Becoming PCI DSS compliant can be a long journey and we like to begin, possibly controversially, with requirement 12 of the 12 PCI DSS Compliance Requirements. This requirement includes information security governance and there's a lot in there about your security policies. Why begin here, you might ask? Well, watch on...