Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Coffee Talk with SURGe: 2023-SEPT-05 Mudge Joins CISA, Qakbot Takedown, Infamous Chisel Malware

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share their favorite hack of all time before a deep dive on extortionware vs. ransomware.

Becoming FedRAMP and StateRAMP Authorized, Part 2 - Common FedRAMP Mistakes You Can Avoid

August 31, 2023 By Isac Hur, Senior FedRAMP/ StateRAMP/ CMMC Practice Lead and Quality Assurance As a compliance auditor and practitioner in the FedRAMP space, I see a lot of mistakes cloud service providers (CSPs) make that cause them a tremendous amount of grief when seeking authorization. The process is painful enough on its own, but many of the people you hear venting frustration have made missteps.

Cybersecurity Should Not Be Under IT Department

We delve into a critical flaw that continues to persist within many organizations—the subservience of cybersecurity teams to their overarching IT counterparts. Join us as we unpack the challenges stemming from this hierarchy and explore the urgent need for a transformative shift. 🔒 Subordination No More: It's disheartening to witness security teams relegated to a subordinate role within IT departments. The pervasive 'can we' versus 'should we' dilemma underscores a bigger issue that hampers our collective progress.

Tips and Tools for Open Source Compliance

You don’t need us to tell you that open source software is becoming a very significant percentage of commercial software codebases. Open source components are free, stable, and enable you to focus your resources on the innovative and differentiated aspects of your work. But as the use of open source components increases, compliance with open source licenses has become a complex project of growing importance. So how can you stay on top of compliance and what tools are out there to help?

Understanding the Principle of Least Privilege in 2023

The principle of least privilege is a crucial element in keeping data secure from malicious users and cyberattacks. This concept puts restrictions on access rights so that only necessary privileges are provided to applications, systems, and users for them to carry out their duties. By incorporating this measure into various platforms/environments, it greatly reinforces cybersecurity as well as the protection against unauthorised use or misuse of information.

PCI DSS Requirement 4 : Summary of Changes from Version 3.2.1 to 4.0 Explained

In this video, we at VISTA InfoSec provide a detailed summary of the changes made to PCI DSS Requirement 4 from version 3.2.1 to 4.0. Our expert, Narendra Sahoo, explains the key differences and what they mean for your organization’s compliance with the Payment Card Industry Data Security Standard (PCI DSS). As a leading provider of service and consulting services, VISTA InfoSec is committed to helping our clients navigate the complex world of information security and compliance. Watch this video to learn more about the changes to PCI DSS Requirement 4 and how they may affect your business.

Insights at Your Fingertips: Ekran System's Dashboards Update

Our team is constantly working on improving the experience for our customers and their end users. We are happy to announce that Ekran System has updated its Management Tool dashboards to make them even more well-structured and user-friendly. Read this five-minute post to discover our new dashboards.