Security News

Five best practices for achieving and maintaining SOC 2 compliance
2020-04-24 05:30

SOC 2 compliance is evaluated by independent third-party auditors who assess a company's ability to comply with these core principles. SOC 2 was developed by the American Institute of CPAs and designed specifically for service providers that store customer data in the cloud, meaning virtually every SaaS company operating today should consider achieving SOC 2 compliance.

Five contingency best practices for SOCs to handle uncertainty
2020-04-22 05:30

SOCs are familiar with natural disasters and other inclement weather that includes floods, tornadoes and even ice storms, and it's critical to keep a SOC operational in the event that there is reduced local staff or access to physical infrastructure. SOCs operate as busy, open-office environments with team members working closely together to monitor and mitigate threats.

Shared Assessments Program issues set of best practices and tools to help orgs comply with the CCPA
2020-04-16 01:00

The Shared Assessments Program issued "CCPA Privacy Guidelines & Checklists," the security and risk industry's first comprehensive set of best practices and tools to help organizations comply with the California Consumer Privacy Act. "As participants networked this past year to share ideas, best practices and pain points, the committee initiated a set of Privacy White Papers to help industry peers navigate and provide checklists to map their progress."

Best practices and challenges in adopting continuous software testing
2020-04-02 04:30

Businesses must accelerate the shift to comprehensive continuous software testing in order to remain competitive, according to a report released by Capgemini and Broadcom. While 55% of the enterprises surveyed have now adopted a continuous software testing approach, its slow increase in maturity demonstrates a critical challenge for organizations to overcome.

Live Webinar | Four Identity Management Best Practices for Improving Patient Care as Learned from Top US Children's Hospitals
2020-03-09 17:48

The process of constructing a holistic policy-based identity management solution can be difficult and overly complex, especially in the sensitive hospital environment with myriad identities. An integrated identity ecosystem provides a unified view across both cyber and physical security system; improving the overall hospital experience.

10 best practices for using Windows servers
2020-03-06 16:55

Automated tools exist to ensure that your Windows servers stay as secure and trouble-free as the day they were set up. Here is a simple set of management principles that are easy to implement at any budget and skill level to help your IT department take hold of its Windows servers and make sure they are managed efficiently and securely, while being optimized to deliver the best performance possible.

Infoblox announces enterprise best practices for DoT/DoH
2020-02-25 15:00

Infoblox, the leader in Secure Cloud-Managed Network Services, announced Enterprise best practices on DNS over TLS and DNS over HTTPS. These DoT/DoH guidelines are based on Infoblox's longtime commitment to providing customers with DDI services that enable them to easily and effectively secure their own DNS communications. "Developments like DoT and DoH are valuable efforts to address this problem, but when they are used to bypass a company's internal DNS infrastructure or evade their security controls, a host of new challenges emerge for IT managers."

16 best practices for improving cybersecurity
2020-02-24 13:00

Cisco's CISO Benchmark Study for 2020 offers some perspective on the dynamic nature of security work as well as some best practices to make life a little easier and data somewhat more secure. Threats from mobile devices are now the biggest security threat with more than half of the respondents said mobile devices are now very or extremely challenging to defend.

5 best practices for IIoT project success
2020-02-21 20:24

Based on the results of these testbed proofs-of-concept, today the IIC released a white paper, A Compilation of Testbed Results: Toward Best Practices for Developing and Deploying IIoT Solutions, detailing the best practices companies should adopt to ensure successful IIoT deployments. What isn't different are the best practices organizations can adopt to ensure that the early stages of IIoT development and deployment go as smoothly and successfully as possible.

ProcessUnity Vendor Risk Management expanded to include new best practices configuration
2020-02-20 16:06

ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today announced a new pre-built configuration of its award-winning Vendor Risk Management solution. Best Practices Configuration for ProcessUnity Vendor Risk Management is a pre-configured Third-Party Risk Management program with turn-key workflows, assessments, calculations, risk analysis and reporting, allowing small to midsize organizations to successfully launch and maintain a third-party risk program from day one.