Accelerating SaaS security certifications to maximize market access

Accelerating SaaS security certifications to maximize market access

The regulatory landscape for Software-as-a-Service (SaaS) offerings is rapidly changing worldwide as governments seek to address concerns around privacy, security, and data sovereignty. While the European Union’s Cybersecurity Certification Scheme for Cloud Services (EUCS) has set a high standard for data protection, Asian countries are also stepping up their regulatory frameworks. For instance, the Information System Security Management and Assessment Program (ISMAP) in Japan provides a baseline standard of protection for user data, imposing stringent…

Read More

Accelerating SaaS security certifications to maximize market access

Accelerating SaaS security certifications to maximize market access

The regulatory landscape for Software-as-a-Service (SaaS) offerings is rapidly changing worldwide as governments seek to address concerns around privacy, security, and data sovereignty. While the European Union’s Cybersecurity Certification Scheme for Cloud Services (EUCS) has set a high standard for data protection, Asian countries are also stepping up their regulatory frameworks. For instance, the Information System Security Management and Assessment Program (ISMAP) in Japan provides a baseline standard of protection for user data, imposing stringent…

Read More

10 Security Tips for Business Travellers This Summer

10 Security Tips for Business Travellers This Summer

Now the weather is hotting up, many workers may be considering spending some time away from their desk. You may be more inclined to head to that conference in Barcelona or take a trip with the family but keep the company phone on you. Whether you’re hopping on a plane or enjoying a staycation closer to home, taking your business away from your regular workplace brings about a new bevy of security risks. These include…

Read More

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Cyber Insurance Premiums Are Declining, Howden Insurance Brokers Report Finds

Improved cyber hygiene among businesses has led to a reduction in cyber insurance premiums by 15% worldwide over the last two years, a new report from Howden Insurance Brokers has found. This is despite the fact that cyberthreats, particularly ransomware attacks, are becoming more prevalent. Awareness of cyber hygiene practices, like multifactor authentication, EDR and cloud backups, has grown significantly since 2022. Ransomware attacks have increased by 18% this year, according to Howden and NCC…

Read More

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code

More than half of open-source projects contain code written in a memory-unsafe language, a report from the U.S.’s Cybersecurity and Infrastructure Security Agency has found. Memory-unsafe means the code allows for operations that can corrupt memory, leading to vulnerabilities like buffer overflows, use-after-free and memory leaks. The report’s results, published jointly with the FBI, Australian Signals Directorate’s Australian Cyber Security Centre, and Canadian Cyber Security Center, are based on analysis of 172 critical projects defined…

Read More

AI Is Changing the Way Enterprises Look at Trust: Deloitte & SAP Weigh In

AI Is Changing the Way Enterprises Look at Trust: Deloitte & SAP Weigh In

Whether you are creating or customizing an AI policy or reassessing how your company approaches trust, keeping customers’ confidence can be increasingly difficult with generative AI’s unpredictability in the picture. We spoke to Deloitte’s Michael Bondar, principal and enterprise trust leader, and Shardul Vikram, chief technology officer and head of data and AI at SAP Industries and CX, about how enterprises can maintain trust in the age of AI. Organizations benefit from trust First, Bondar…

Read More

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware Cheat Sheet for 2024: What Is Ransomware?

Ransomware is arguably the most high-profile security threat of the moment. Cybercriminals across the world are demanding money from victims by holding their devices and data hostage. This type of attack, in which data is encrypted or claimed to be and victims are prompted to pay for the key to restore access, has been growing rapidly since 2013 and is now one of the most common types of malware. TechRepublic’s cheat sheet about ransomware is…

Read More

What Security Means to Families | McAfee Blog

What Security Means to Families | McAfee Blog

What is our real job as parents? Is it to ensure our kids get good grades? – Maybe. Or is it ensuring we can give them the latest and greatest clothing and devices? Mmmm, not really. When all is said and done, I believe our real job is to keep our kids safe, teach them to be independent, and set them up for success – both online and offline. As first-generation digital parents, many of…

Read More

How to Spot a Business Email Compromise Scam

How to Spot a Business Email Compromise Scam

So this is the first step: Take control of your emotions. Yes, it can be difficult if you work in a demanding field. But it’s your best first defense, and your employer will thank you for it (or, at least, they should). Always Confirm Through a Second Channel Now that you’re skeptically questioning the legitimacy of the urgent request, check to make sure the email is coming from the person it claims to be from….

Read More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple’s latest version of its mobile operating system, iOS 18, was unveiled during WWDC ‘24 on June 10, 2024, and features many niceties that users have been wanting for years. From AI integration with Siri and throughout the system to a standalone Passwords app, to being able to send messages via satellite when your iPhone doesn’t have service, there’s a feature that will likely appeal to someone. Whether you’re using an iPhone or an iPad,…

Read More
1 8 9 10 11 12 19