Cut Time & Costs: 7 Best Practices to Follow When Choosing a Cloud Security Solution
Mark Moore | | Application Security, Budgeting and Buying Tips, Threat Stack Cloud Security Requirements Worksheet & Workbook
In a SaaS world, everyone wants to move fast! Rapid development can slash time to market and put you in a strong competitive position, and of course this is the way to operate as long as you’re not sacrificing quality. But remember: There’s bad fast as well as good fast ... Read More
HIPAA Compliance Tips & Best Practices — Factors to Consider When Developing Effective Policies & Procedures
Mark Moore | | All Things Compliance, HIPAA Compliance, HIPAA Compliance Best Practices, HIPAA Compliance Policies & Procedures
Our last post on HIPAA compliance — HIPAA Compliance Tips & Best Practices — Building Your Foundational Knowledge — provided expert insights that are designed to help healthcare providers and business associates develop their foundational knowledge of HIPAA regulations and requirements. Today’s post offers insights into how an organization can ... Read More
How to Create a Security Risk Assessment for Containers in 5 Steps
Mark Moore | | Containers, Orchestration & Security, Risk Assessment and Management, Risk Assessment for Containers, Security Research & Strategy
When adopting containers, organizations need to create a risk profile for the types of threats and vulnerabilities they expect to experience. This type of analysis is especially important with containers, since the attack surface increases significantly, while the level of security visibility across hosts, containers, and the infrastructure control plane ... Read More
HIPAA Compliance Tips & Best Practices — Building Your Foundational Knowledge
The last few years have seen a number of failures in the field of HIPAA compliance and fines that would put many smaller-scale practices out of business. While an increase in the use and sharing of electronic patient data accounts for many HIPAA compliance issues, the bottom line is that ... Read More
4 Things You Need to Know About SOC 2 Compliance
Compliance isn’t as simple as a connect-the-dots exercise. When you consider how fast companies are moving to and expanding in the cloud, and then take into account the proliferation of cloud-based security threats, compliance can be a little dizzying. We’re here to break down the complexities of compliance requirements for ... Read More
HIPAA Compliance Checklist
Mark Moore | | All Things Compliance, HIPAA Compliance, HIPAA Compliance Best Practices, Threat Stack Use Cases
Any organization that has access to electronic Protected Health Information (ePHI) must comply with HIPAA. If your organization needs to be compliant, this isn’t something you can delay or phase in gradually because failure to meet HIPAA compliance can carry steep penalties. (On the positive side, becoming HIPAA compliant can ... Read More
PCI Compliance Checklist
PCI DSS stands for Payment Card Industry Data Security Standard. These standards are in place to help businesses protect themselves and their customers by outlining how sensitive personal information, like credit card data, gets stored. If you process payments using debit or credit cards, you must meet PCI DSS, or ... Read More
AWS HIPAA Compliance Best Practices Checklist
The Health Insurance Portability and Accountability Act, or HIPAA, is a United States law that seeks to protect the privacy of patients’ medical records and other health information provided to health plans, doctors, hospitals, and other health care providers. It seeks to make health insurance coverage available to everyone — ... Read More
Machine Learning, Signatures, Rules, & Behaviors — Tips on Navigating Modern Cloud Security Solutions
Mark Moore | | Cloud Security Solutions, Evaluating Cloud Security Solutions, Security Research & Strategy
Cloud security is one of the most rapidly changing technology landscapes out there. And naturally, the market for security tools is also constantly evolving as stakeholders continue to develop an understanding of how important a mature security posture is to the entire organization — from innovation to sales to ongoing ... Read More
AWS Security Readiness Checklist
This AWS Security Readiness Checklist is intended to help organizations evaluate their applications and systems before deployment on AWS. This evaluation is based on a series of best practices and is built off the Operational Checklists for AWS1. The checklist consists of three categories: Basic Operations Checklist: Helps organizations take ... Read More