How to Receive a Clean SOC 2 Report

Controls—SOC 2 is all about controls. It’s right there in the name: Service Organization Controls, S-O-C. A SOC 2 report is a de facto requirement for any organization that wants to store any customer data in the cloud, which means most Saa… Continue reading How to Receive a Clean SOC 2 Report

6 Steps for Establishing and Maintaining Digital Integrity

To create a secure digital profile, organizations need digital integrity. This principle encapsulates two things. First, it upholds the integrity of files that store operating system and application binaries, configuration data, logs and other crucial … Continue reading 6 Steps for Establishing and Maintaining Digital Integrity

Cryptojacking Affected a Quarter of Organizations in the Cloud, Finds Report

Cryptojacking attacks affected a quarter of organizations in their cloud environments, found a recent cloud security report. In RedLock’s Cloud Security Trends, researchers with the security firm’s Cloud Security Intelligence (CSI) team dis… Continue reading Cryptojacking Affected a Quarter of Organizations in the Cloud, Finds Report