Sophie Maler
New SEC cybersecurity disclosure rules: Are you ready?

New SEC cybersecurity disclosure rules: Are you ready?

As cyber threats continue escalating, regulatory bodies respond with new directives to ensure better transparency and security practices. Yesterday, the U.S. Securities and Exchange Commission (SEC) introduced new rules requiring increased disclosure from public...

Navigating SOC 2 compliance on AWS: A survival guide

Navigating SOC 2 compliance on AWS: A survival guide

Service Organization Control 2 (SOC 2) compliance holds a pivotal role in the realm of cybersecurity. Particularly designed for service providers storing customer data in the cloud, it ensures rigorous data protection protocols are in place. SOC 2 compliance isn't...

3 ways to tackle misconfigurations in your SaaS and cloud

3 ways to tackle misconfigurations in your SaaS and cloud

In today's rapidly evolving digital landscape, public cloud security breaches due to misconfigurations have become a growing concern. A recent survey conducted by the Cloud Security Alliance (CSA) revealed that 43% of the surveyed companies had experienced a public...

What Is the principle of least privilege?

What Is the principle of least privilege?

The principle of least privilege (POLP) security concept requires that users, processes, and systems only have the minimum access rights necessary to perform their designated function. This principle reduces the risk of security breaches and unauthorized access by...

IAM – what is identity and access management?

IAM – what is identity and access management?

  Identity and access management (IAM) is a discipline concerned with managing electronic or digital identities. The IAM function allows information technology (IT) managers to control access of users, devices, and applications to information within their...