Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness

New technologies often present interesting challenges for security teams, with cloud services such as AWS, Azure and GCP providing particularly novel cases in comparison to “classic” on-premise systems. As cloud services race ...

Smartphone Election in Washington State

This year: King County voters will be able to use their name and birthdate to log in to a Web portal through the Internet browser on their phones, says Bryan Finney, the ...
Qualys cloud

AWS Previews Cloud Security Advances

Amazon Web Services (AWS) at its recent re:Invent 2019 conference previewed two tools to advance cloud security and made available a tool that promises to simplify audits. Available in preview now, Amazon ...
Security Boulevard

Internal Audit and IT: Joining the Same Cybersecurity Team

| | auditing, HIPAA, ISO27001, PCI, SOC 2
Effective cybersecurity management requires cross-collaboration between multiple stakeholders, and becomes increasingly complex with larger organizations. Though technology can serve as a solution to mitigate security risk, oftentimes the solution requires personnel or ...
You Need To Know How Cybersecurity Affects Mergers and Acquisitions

You Need To Know How Cybersecurity Affects Mergers and Acquisitions

Time to Learn More Anytime you plan to get involved with something, whether it be a person, place, or thing, you need information —sometimes a lot of information. In the world of ...

SOC 2 Audit Explained For SaaS Companies

| | auditing, SaaS, SOC 2, SOC 2 Compliance
Overview As leaders in the SaaS industry, our ongoing success relies on security and the ability to provide clients with certain reassurances about our operational policies, including privacy, availability—and most importantly, cybersecurity ...

Clarifying the Misconceptions: Monitoring and Auditing for Container Security

An effective container security strategy consists of many parts. Organizations should first secure the build environment using secure code control along with build tools and controllers. Next, they should secure the contents ...

On Financial Fraud

There are some good lessons in this article on financial fraud: That's how we got it so wrong. We were looking for incidental breaches of technical regulations, not systematic crime. And the ...

Securing Elections

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system ...