Tag: Security Management

Highlighted - Security & Compliance

Our most relevant Security & Compliance articles

Should pentest exercises be performed? Why? How often? When it comes to cybersecurity, nobody is immune to the risks. Penetration testing is a cybersecurity technique that mimics a cyber attack to identify and exploit vulnerabilities throughout an organization’s on-premise and/or cloud systems. Some of the most important penetration testing methodologies and standards include OWASP, MASVS…

Highlighted - Security & Compliance

SOC2, ISO, GDPR, CCPA, NIST, HIPAA, and others: Are they related?

In an industry that is increasingly saturated with security standards and regulations, it is important to know their scope, applicability, and how they relate to each other. Compliance, whether voluntary or mandatory, will depend on the type of company and/or its residence. Below is a general vision of the majority of security standards, regulations, and…