Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Navigating AI's New Horizons: Empowering AI Model Development, Security and Compliance

The rapid rise of artificial intelligence, more specifically, generative AI systems such as OpenAI’s ChatGPT, has simultaneously spurred intense development and concern over the past year. On the 30th of October, President Joe Biden signed an Executive Order that urges new federal standards for AI development, safety, security, and trustworthiness that also address many other facets of AI risk.

The PCI DSS Compliance Checklist for 2024 [XLS Download]

If you recently took a relaxing European vacation and flew Air Europa, check your credit card statement. They are the latest victim of a malicious hack exposing customer credit card numbers, expiration dates, and even the associated stored CCV codes—which contradicts Payment Card Industry Data Security Standard (PCI DSS) regulations.

Tips for Achieving Success With a NERC CIP Audit

Electrical utilities are responsible for just about everything we do. This presents a tremendous burden on those who operate those utilities. One way these organizations offer assurance is through the audit process. While audits can generate tremendous anxiety, good planning, and tools can help make the entire process go smoothly. Moreover, these can also help to achieve positive results.

New SEC Cybersecurity Reporting Rules Take Effect Soon: Here's How SafeBreach Can Help

On December 15, 2023, the U.S. Securities and Exchange Commission (SEC) will be enacting new rules mandating corporations to disclose specific information related to their cybersecurity. These rules require companies subject to SEC regulation—essentially, any company that trades their shares on a U.S. stock exchange—to disclose details following a material security incident.

The complete guide to compliance risk management

To build a successful business you’ll need to acquire new customers, save on costs, and avoid major pitfalls that could impact your bottom line. An important aspect of this is managing your organization's compliance risk. These include the risk of penalties, legal judgments, and other issues that could come as a result of not complying with legal regulations and industry standards.

How CrowdComms and Henchman use ISO 27001 and SOC 2 together

If you’re a growing start up, chances are you’ll need to demonstrate trust to your customers. To ensure you have strong data protection measures in place and a robust security posture, they’ll often ask to review either your ISO 27001 certification or your SOC 2 report. For a while, you may get by by filling out their lengthy security questionnaires, but eventually you’ll need to get your ISO 27001 or SOC 2, depending on your product, industry, and region.

Monitor highly regulated workloads with Datadog's FIPS-enabled Agent

Protecting sensitive data from the threat of exposure is a non-negotiable business imperative for organizations, especially those in highly regulated sectors like government and healthcare. To help organizations keep their data secure, the National Institute of Science and Technology (NIST) developed a set of requirements for the hardware and software components responsible for data encryption.

Decoding Essential 8 Compliance: Tanium's Unique path to Success

From Tanium's Australian bureau, we dive into the Essential 8 baseline mitigation strategies and reveal how Tanium's unique architecture goes beyond the traditional approach of other vendors and enables organisations to overcome key challenges to help them successfully achieve automated continuous compliance.