Adrian Szwarcburg joins DigitSec as SVP of business development

Software industry veteran Adrian Szwarcburg has joined DigitSec, provider of the AppSec testing platform purpose-built for Salesforce, as senior vice president of business development. Szwarcburg most recently was vice president of channel sales and pa… Continue reading Adrian Szwarcburg joins DigitSec as SVP of business development

Information security vulnerability vs threat vs risk: What are the differences?

If organisations are to adequately protect their sensitive data, they need to understand the three core components of information security: threat, vulnerability and risk. Those unfamiliar with the technicalities of information security might assume th… Continue reading Information security vulnerability vs threat vs risk: What are the differences?

Construindo uma lista completa de verificação de segurança de rede

Entender o que auditar em uma rede pode ser caótico e confuso. Construir uma lista de verificação de segurança de rede completa é crucial para organizações com computadores conectados à Internet ou entre si. Pense nisso como uma varredura antivírus …
T… Continue reading Construindo uma lista completa de verificação de segurança de rede

Despite the pandemic, 85% of organizations completed their audits as planned

While COVID-19 was a tectonic shift for businesses, compliance programs were largely unimpacted, according to a report by A-LIGN. In fact, cybersecurity teams have compelling opportunities to consolidate audit operations and leverage technology to acce… Continue reading Despite the pandemic, 85% of organizations completed their audits as planned

Streamlining cloud compliance through automation

As companies migrate to the cloud to take advantage of its scalability and flexibility, many don’t fully realize how this move will affect their compliance with cybersecurity and privacy requirements mandated by laws and standards such as SOX, CC… Continue reading Streamlining cloud compliance through automation

3 myths about ISO 27001 certification

ISO 27001 is the international standard for an ISMS (information security management system), a best-practice approach to security that helps organisations achieve all of their data privacy compliance objectives. If you are currently weighing up your o… Continue reading 3 myths about ISO 27001 certification

Top 10 risks to include in an information security risk assessment

An ISO 27001 risk assessment should have five key steps. In this blog, we look at the second step in the process: identifying the risks that organisations face. How to identify threats You must determine which can compromise the confidentiality, integr… Continue reading Top 10 risks to include in an information security risk assessment

Secureframe raises $4.5M to help businesses speed up their compliance audits

While certifications for security management practices like SOC 2 and ISO 27001 have been around for a while, the number of companies that now request that their software vendors go through (and pass) the audits to be in compliance with these continues to increase. For a lot of companies, that’s a harrowing process, so it’s […] Continue reading Secureframe raises $4.5M to help businesses speed up their compliance audits

Most compliance requirements are completely absurd

Compliance is probably one of the dullest topics in cybersecurity. Let’s be honest, there’s nothing to get excited about because most people view it as a tick-box exercise. It doesn’t matter which compliance regulation you talk about – they all g… Continue reading Most compliance requirements are completely absurd