Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is the Massachusetts Data Security Law? Guide + Tips

The Massachusetts Data Security Law (201 CMR 17.00) safeguards the personal information of Massachusetts residents. The law went into effect on March 1, 2010, and at the time, was one of the most comprehensive data privacy laws passed in the United States. Since the law’s passing, a variety of U.S. States have passed more robust data privacy legislation, including the notable California Consumer Privacy Act (CCPA) and Virginia Consumer Data Privacy Act (VCDPA).

Understanding DMARC: A Comprehensive Guide to Email Security

In this comprehensive guide, we will delve into the world of DMARC (Domain-based Message Authentication, Reporting, and Conformance) and explore how it enhances email security, protects against phishing attacks, and ensures the authenticity of emails. As a leading expert in cybersecurity, we will provide you with valuable insights and detailed information on how DMARC works, its benefits, implementation steps, and best practices.

TrustCloud Launches TrustHQ for Slack, to enable Slack-first Trust Workflows for GRC and Sales teams

TrustHQ™ turns Slack into the central hub for employees, GRC and sales teams to prioritize, track and complete critical internal and customer-facing trust-related tasks in a shared digital space.

CISO Global Bolsters Its Security Management Platform Argo To Improve Real-Time Security Decision Making for Enterprises

CISO Global strengthens its security management platform Argo to increase the effectiveness of security teams who now can access real-time data across tool sets to make better informed decisions.

Our approach to ticketing and automation

In this series, you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, and Compliance Teams to learn about the team’s approach to keeping Vanta secure. We’ll also share some guidance for teams of all sizes — whether you’re just getting started or looking to uplevel your operations.

Top 10 Security Automation Tools

With the increasing threats of cyber attacks, safeguarding sensitive data and digital assets has become one of the key considerations of modern organizations. According to The State of Security 2023 report, cyber attacks happen every 39 seconds, and a critical security issue can cause a median of 14 hours of downtime. As a result, organizations are turning to security automation tools to effectively mitigate software risks and respond to security incidents promptly.

Integrate Cloudflare Zero Trust with Datadog Cloud SIEM

Cloudflare's Zero Trust platform helps organizations map and adopt a strong security posture. This ranges from Zero Trust Network Access, a Secure Web Gateway to help filter traffic, to Cloud Access Security Broker and Data Loss Prevention to protect data in transit and in the cloud. Customers use Cloudflare to verify, isolate, and inspect all devices managed by IT. Our composable, in-line solutions offer a simplified approach to security and a comprehensive set of logs.

How the Intersection of Technology and Patient Care Creates Security Challenges

The digital transformation of healthcare, involving patients, staff, doctors, and technology, presents significant challenges to security teams in terms of skills and capacity. This challenge can be seen in the U.S. Department of Health and Human Services' Office for Civil Rights which reported 609 data breaches with more than 500 records being compromised in 2021.