by deb_infosec | Mar 8, 2023 | Compliance
A business continuity or incident response table top is a simulated scenario-based exercise designed to test an organization’s ability to respond to a potential crisis or disaster situation. The exercise typically involves a group of key stakeholders and...
by deb_infosec | Feb 28, 2023 | Compliance
SOC2 (Service Organization Control 2) has become the de facto audit requirement for the cloud in the commercial space. Whether your company has a SaaS product or you are evaluating a cloud service offering, you need to understand what SOC2 is and how to evaluate a...
by deb_infosec | Feb 25, 2023 | Threats
Holiday Inn Ransomware Attack One thing is for sure, you don’t want to be a victim of ransomware. Almost daily, there is another breach and ransomware was deployed as part of the hack. For instance, the Holiday Inn or IHG hack is another example of not being...
by deb_infosec | Feb 20, 2023 | Cloud
Here are the best practices for securing cloud serverless architecture: Implement proper access controls: Use identity and access management (IAM) to set up fine-grained permissions for resources and APIs. Secure data in transit and at rest: Encrypt sensitive data and...
by deb_infosec | Feb 19, 2023 | Governance
Security governance is the set of policies, procedures, and standards that an organization establishes to manage its cybersecurity risks. The compliance program ensures the confidentiality, integrity, and availability of its data and assets. To be successful, ensure...