JumpCloud Supports NIST SP 800-63 Memorized Secrets

| | Compliance, security
Learn about the memorized secret guidelines set forward by NIST SP 800-63B, and how you can use JumpCloud to achieve them for free. The post JumpCloud Supports NIST SP 800-63 Memorized Secrets ...
JumpCloud Directory Insights User Access Event Logging Activity Log UI Screenshot

Automate Reporting Across LDAP Apps, Networks, & Servers

| | Compliance, ldap
Analyze user LDAP authentication events from a web-based portal or automatically export the data for more analysis. Try JumpCloud Free today. The post Automate Reporting Across LDAP Apps, Networks, & Servers appeared ...

Moving Above and Beyond Compliance, Part 2: Cybersecurity Best Practices

| | Blog Posts, Compliance
In part 1 of this blog series we discussed compliance firefighting. We mentioned that a proactive approach can reduce the amount of fires and save costs in the long run. In this ...

Building Your Team up to Win the Security Arms Race

In a fast-changing world, stopping to assess your success isn’t really an option anymore. It is increasingly important that security teams are constantly proving their worth and tracking their successes with a ...

Gearing Towards Your Next Audit – Understanding the Difference Between Best Practice Frameworks and Regulatory Compliance Standards

Security configuration management (SCM) can help organizations do much more than just harden their attack surfaces against intrusions. This fundamental control also has the ability to make your audits flow more smoothly ...

JumpCloud and the CCPA

JumpCloud takes customer privacy seriously. We are GDPR compliant, and we are not subject to CCPA due to AB 25. Learn more in this blog. The post JumpCloud and the CCPA appeared ...

PCI DSS 4.0 and the Changing Approach to Compliance

In the past, the focus of PCI compliance was to store as little sensitive data as possible and keep it secured. In today's data driven world, that focus has changed.  ...
PCI DSS Part 1: Where to Start?

PCI DSS Part 1: Where to Start?

| | Compliance
PCI DSS compliance doesn’t have to be stressful or unobtainable. Well-founded security practices are crucial to any security plan for achieving PCI compliance. The post PCI DSS Part 1: Where to Start? ...
NSA warning on location data exposure: your web browser is a liability

NSA warning on location data exposure: your web browser is a liability

The National Security Agency issued a warning that exposed location data from mobile devices can pose a security risk for government personnel ...
Data breach header image for the Sonrai Security blog and webinar

Avoiding Common Azure Configuration Errors

Learn the common mistakes and pitfalls DevOps and security teams commonly make when configuring Microsoft Azure. The post Avoiding Common Azure Configuration Errors appeared first on Sonrai Security ...