certification

Cloudflare Area 1 earns SOC 2 report

Cloudflare Area 1 is a cloud-native email security service that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against spear phishing, Business Email Compromise (BEC), and other advanced threats. Cloudflare Area 1 is part ofRead more

Cert Audits: Ensuring Security and Trustworthiness in the Digital Age

CERT-IN audits are designed to assess the compliance of organizations with specific security guidelines and standards. These audits help organizations identify vulnerabilities, gaps in security practices, and areas where improvements are required. CERT AUDITS To benefit from audits, organizations should actively engage with auditors and follow their guidelines for auditing procedures. It is essential to maintain open communication with CERT-IN and act upon their recommendations to maintain compliance

One Week Left to Register for the Ultimate Conversational AI Workshop

Time is running out to register for our upcoming Conversational AI workshop. This is your chance to learn from the top industry experts and gain the certification you need to stay ahead of the curve. Don’t miss out on this opportunity to enhance your skills and take your career to the next level. Register now before it’s …

One Week Left to Register for the Ultimate Conversational AI Workshop Read More »

One Week Left to Register for the Ultimate Conversational AI Workshop

Time is running out to register for our upcoming Conversational AI workshop. This is your chance to learn from the top industry experts and gain the certification you need to stay ahead of the curve. Don’t miss out on this opportunity to enhance your skills and take your career to the next level. Register now before it’s …

One Week Left to Register for the Ultimate Conversational AI Workshop Read More »

One Week Left to Register for the Ultimate Conversational AI Workshop

Time is running out to register for our upcoming Conversational AI workshop. This is your chance to learn from the top industry experts and gain the certification you need to stay ahead of the curve. Don’t miss out on this opportunity to enhance your skills and take your career to the next level. Register now before it’s …

One Week Left to Register for the Ultimate Conversational AI Workshop Read More »

Shadow IT is increasing and so are the associated security risks

Despite years of modernization initiatives, CISOs are still contending with an old-school problem: shadow IT, technology that operates within an enterprise but is not officially sanctioned — or on the radar of — the IT department. Unvetted software, services, and equipment can be nightmare fuel for a security team, potentially introducing a lurking host of …

Shadow IT is increasing and so are the associated security risks Read More »

Hackers exploit Gmail Blue checkmark impacting 1.8 billion Google users

Attention all business Gmail account holders, it is crucial to stay informed about the following news story. Security experts have issued a warning regarding the exploitation of the Gmail Blue Check Mark feature by scammers. These individuals are utilizing the mark to create counterfeit email addresses resembling those of well-known brands. Their goal is to …

Hackers exploit Gmail Blue checkmark impacting 1.8 billion Google users Read More »

Netherlands makes case for harmonisation of cloud security standards

Late in 2022, an update of the Dutch Corporate Governance Code was released to include a section on governance of IT. The code prescribes rules of conduct for directors of listed companies to protect the interests of shareholders, employees and other stakeholders.   The revision means that listed in their annual reports for 2023 companies will …

Netherlands makes case for harmonisation of cloud security standards Read More »

New Cloud Security Alliance Report Finds Cloud Services Are Well-rooted in All Aspects of Financial Services

Trust and Regulation were the greatest influencing factors, report found SEATTLE – June 6, 2023 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment, today issued its latest survey report, State of Financial Services in Cloud. The survey …

New Cloud Security Alliance Report Finds Cloud Services Are Well-rooted in All Aspects of Financial Services Read More »

Benefits of the NCSC Cyber Essentials Program

Information is a global currency, and cyber criminals are ready and waiting to steal it. Companies need protection, and some need help to determine whether their security posture is adequate. For UK-based organizations, the NCSC Cyber Essentials program provides a foundational level of clarity and guidance on their security measures. What Is the Cyber Essentials …

Benefits of the NCSC Cyber Essentials Program Read More »

HITRUST CSF Assessments: e1, i1, r2—What’s the Difference?

HITRUST CSF is the most widely-adopted cybersecurity framework for healthcare organizations in the U.S. HITRUST CSF provides broad assurance for different risk levels and compliance requirements with greater reliability than other assessment options. There are three types of HITRUST CSF Assessments to consider when deciding what’s best for your organization—the e1, i1, and r2 Assessments.  …

HITRUST CSF Assessments: e1, i1, r2—What’s the Difference? Read More »

FTC Issues Proposed Order Against Home Security Camera Company Ring

On May 31, 2023, the Federal Trade Commission announced a proposed order against home security camera company Ring LLC (“Ring”) for unfair and deceptive acts or practices in violation of Section 5 of the FTC Act. According to the FTC’s complaint, Ring allegedly made false or misleading representations that it took reasonable steps to ensure …

FTC Issues Proposed Order Against Home Security Camera Company Ring Read More »

LogicGate accelerates policy management processes with OpenAI integration

LogicGate introduced a new OpenAI integration that will help automate and inform GRC processes, including policy generation. Founded in 2015 by seasoned risk consultants, LogicGate automates and centralizes tedious, time-consuming governance, risk, and compliance (GRC) workflows with Risk Cloud, its integrated and scalable GRC platform. “Organizations are looking for ways to leverage the new crop …

LogicGate accelerates policy management processes with OpenAI integration Read More »

Cyber Incident Response Masterclass: Navigating Loss Control & Innovative Cyber Claims Management

Incident response knowledge helps cyber insurance professionals provide value-added services to their policyholders. They can offer guidance and resources to insured organizations to enhance their incident response capabilities, implement preventive measures, reduce potential losses and minimize the likelihood and impact of future cyber incidents. This proactive approach benefits both the insured and the insurer by …

Cyber Incident Response Masterclass: Navigating Loss Control & Innovative Cyber Claims Management Read More »

Be a Certified Security Awareness and Culture Professional (SACP)™

All, I thought it was necessary to have an independent, vendor-neutral Cert so we would have a real Certified Security Awareness and Culture Professional (SACP)™. I funded the effort after finding the great team at H Layer Credentialing. This is not something we make money on. This was meant for the community. Here is a …

Be a Certified Security Awareness and Culture Professional (SACP)™ Read More »

Align Your Cybersecurity Program with NIST 800-53

Aligning your cybersecurity program with NIST 800-53 involves mapping your controls and policies to the framework, implementing new controls to fill in the gaps and testing the effectiveness of those controls. With the help of cybersecurity risk management technology, you can optimize and automate key processes to make control implementation easier, faster and more effective.  …

Align Your Cybersecurity Program with NIST 800-53 Read More »

4 Essential Strategies For Enterprise Cybersecurity Workforce Development

OffSec Content Team In our most recent webinar, we were joined by Jeremiah Roe, Field CISO at Synack. Paul Griffin, OffSec’s Head of Customer Success led the conversation about the cybersecurity talent gap and how it continues to present significant challenges for organizations across industries.  Some of the key statistics shared indicate that the shortage …

4 Essential Strategies For Enterprise Cybersecurity Workforce Development Read More »

API Security: Best Practices for Vulnerability Mitigation

The whitepaper titled “API Security: Best Practices for Vulnerability Mitigation,” authored by Jagdish Mohite delves into the critical aspects of API security and provides comprehensive insights on best practices to mitigate vulnerabilities. In today’s interconnected digital landscape, Application Programming Interfaces (APIs) are pivotal in enabling seamless communication and integration between different systems and applications. However, …

API Security: Best Practices for Vulnerability Mitigation Read More »

API Security: Best Practices for Vulnerability Mitigation

The whitepaper titled “API Security: Best Practices for Vulnerability Mitigation,” authored by Jagdish Mohite delves into the critical aspects of API security and provides comprehensive insights on best practices to mitigate vulnerabilities. In today’s interconnected digital landscape, Application Programming Interfaces (APIs) are pivotal in enabling seamless communication and integration between different systems and applications. However, …

API Security: Best Practices for Vulnerability Mitigation Read More »

UK NCSC announces closure of CCP cyber certification scheme

The UK National Cyber Security Centre (NCSC) has announced the closure of the country’s Certified Cyber Professional (CCP) scheme to new applicants from June 30. Current CCP certifications will remain valid until they expire as the sector prepares for the launch of new chartered titles following a successful pilot by the UK Cyber Security Council, …

UK NCSC announces closure of CCP cyber certification scheme Read More »

UK NCSC announces closure of CCP cyber certification scheme

The UK National Cyber Security Centre (NCSC) has announced the closure of the country’s Certified Cyber Professional (CCP) scheme to new applicants from June 30. Current CCP certifications will remain valid until they expire as the sector prepares for the launch of new chartered titles following a successful pilot by the UK Cyber Security Council, …

UK NCSC announces closure of CCP cyber certification scheme Read More »