Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

UpGuard Shared Profiles and NDA Protection // Harsh Budholiya, Product Marketing Lead

Learn from UpGuard's Product Marketing Lead, Harsh Budholiya, as he introduces you to UpGuard's NDA Protection feature in Shared Profiles. As part of Shared Profiles, you now have the option to add a non disclosure agreement, or NDA, that must be accepted by organizations before access is granted. This gives Shared Profile owners complete visibility and control over their privacy settings with features including access controls and logs to ensure sensitive and private information contained in Shared Profiles remains secure.

How Did the Cash App Data Breach Happen?

The CashApp data breach was caused by a former employee who accessed customer financial reports as an act of revenge against the company after their employment was terminated. According to the April 2, 2022 filing with the Securities Exchange Commission by Block (CashApp’s parent company), the employee required access to the financial reports as part of their daily duties.

How to Become HIPAA Compliant in 2022 (Includes Checklist)

HIPAA compliance is regulated by the Department of Health and Human Services (HHS) and enforced by the Office for Civil Rights (OCR). In 2013, the final Omnibus rule was enacted, binding business associates - or third-party vendors - to the Health Insurance Portability and Accountability Act. This modification added another level of compliance complexity to an industry not accustomed to operating in the cybersecurity domain - the healthcare industry.

UpGuard Creating Risk Waivers in Risk Assessment Demo // Chris Schubert, Senior Product Manager

Hear from UpGuard's Senior Product Manager, Chris Schubert, as he introduces you to UpGuard's new Risk Waiver workflow in Risk Assessments. This quarter, we’ve expanded our risk assessments framework so that you can waive risks within each individual risk assessment. This feature streamlines the risk waiver workflow so you can now create, review and waive risks all within a risk assessment.

How to Integrate HECVAT into VRM Programs

‍HECVAT (Higher Education Community Vendor Assessment Toolkit) is a security assessment questionnaire that measures the cybersecurity risk of third-party vendors for higher education institutions. It helps universities ensure that their third-party vendors have implemented proper security practices and policies, which are measured against a comprehensive list of security controls, to protect the large amounts of sensitive data and personally identifiable information (PII) they manage.

What Makes an Effective and Successful CISO?

A CISO (chief information security officer) is a company's senior executive responsible for developing, managing, and implementing its organization’s security program and improving its cybersecurity posture. The CISO oversees the information security programs, protects organizational data and assets, develops IT infrastructures, builds security teams, and handles the overall IT security of the company.

Top Cybersecurity Regulations in India [Updated 2022]

India’s ever-expanding digital infrastructure in the wake of the pandemic has escalated the demand for new, updated, and improved regulatory mandates for strengthening cybersecurity. Rampant cybersecurity incidents have been occurring weekly, alarming businesses, organizations, and individuals across India.