Sophie Maler
New SEC cybersecurity disclosure rules: Are you ready?

New SEC cybersecurity disclosure rules: Are you ready?

As cyber threats continue escalating, regulatory bodies respond with new directives to ensure better transparency and security practices. Yesterday, the U.S. Securities and Exchange Commission (SEC) introduced new rules requiring increased disclosure from public...

Overcoming the Security Challenges of Workforce Offboarding

Overcoming the Security Challenges of Workforce Offboarding

We all know that onboarding a new employee or contractor involves creating a digital identity for them within our organizational ecosystems. This process provides them access to various applications, databases, networks, and systems necessary for their role. However,...

Navigating SOC 2 compliance on AWS: A survival guide

Navigating SOC 2 compliance on AWS: A survival guide

Service Organization Control 2 (SOC 2) compliance holds a pivotal role in the realm of cybersecurity. Particularly designed for service providers storing customer data in the cloud, it ensures rigorous data protection protocols are in place. SOC 2 compliance isn't...

3 ways to tackle misconfigurations in your SaaS and cloud

3 ways to tackle misconfigurations in your SaaS and cloud

In today's rapidly evolving digital landscape, public cloud security breaches due to misconfigurations have become a growing concern. A recent survey conducted by the Cloud Security Alliance (CSA) revealed that 43% of the surveyed companies had experienced a public...

AWS infrastructure security: Top 6 must-know best practices

AWS infrastructure security: Top 6 must-know best practices

Over the last few years, several high-profile data breaches have rocked the tech industry, specifically targeting cloud infrastructure. Many of these attacks started on servers hosted in Amazon Web Services (AWS) and successfully bypassed all the security controls. In...

Unlock the secrets of identity governance and administration

Unlock the secrets of identity governance and administration

Identity governance and administration (IGA) is a critical part of any organization's security posture. Monitoring, controlling, and managing user access to ensure that only authorized personnel have access to sensitive information or resources is an integral part of...

Protect your organization from software supply chain attacks

Protect your organization from software supply chain attacks

On April 1, 2021, San Francisco-based technology company CodeCov discovered that attackers had compromised its software platform, which over 29,000 customers use worldwide to test software code. While that was troubling enough, the tampering reportedly started back in...

What Is the principle of least privilege?

What Is the principle of least privilege?

The principle of least privilege (POLP) security concept requires that users, processes, and systems only have the minimum access rights necessary to perform their designated function. This principle reduces the risk of security breaches and unauthorized access by...

IAM – what is identity and access management?

IAM – what is identity and access management?

  Identity and access management (IAM) is a discipline concerned with managing electronic or digital identities. The IAM function allows information technology (IT) managers to control access of users, devices, and applications to information within their...