Both SOC II Compliance and ISO 27001 provide criteria and frameworks to establish information security management systems. Both are globally recognized. There are slight differences to each and enterprises must consider certain factors about their own product/services, industry, and regulatory governance when looking at either SOC II Compliance or…
Christina Stokes
SOC II Compliance
SOC II Compliance Information security is important for all organizations including, not limited to, cloud-computing providers and Software-as-a-Service (SaaS) companies. Data can be mishandles by application and network security providers leaving these enterprises vulnerable to cyber threats such as extortion, data theft, and malware installation. SOC II Compliance is important…
What is SaaS?
What is SaaS? Software-as-a-Service or SaaS is a software distribution model where cloud providers host applications and make that data/service available to end users over the internet. SaaS is one of three categories of cloud computing. Alongside it you will find both infrastructure-as-a-service or SaaS and platform-as-a-service or SaaS.…
Enterprise Response to Insider Breaches
The National Institute of Standards and Technology (NIST) Cybersecurity Framework’s provides several core steps to implement regarding a threat mitigation program. These core steps are to Identify, Protect, Detect, Respond, and Recover. These steps are used as a framework and within the bounds of a company’s business model…
Ethics & Cyber Policy
Cybersecurity policy makers and enforcers face ethical dilemmas that cover behavior and scope. The behavior of human professionals and organizations, as well as the scope of their actions and investigations, pose a challenge when determining the rights an individual or an organization may have. Organizations have the right to monitor…
SCADA and X.805 Framework
The Importance of SCADA Security SCADA systems are used to control critical areas such national infrastructure processeswhich include water, gas, and electrical power. SCADA systems are also used in facility and manufacturing processes. SCADA systems can be vulnerable to terrorist attacks. A successful attack can disrupt systems causing interrupted services…
IoT and Cyber Policy
Internet of Things (IoT) devices are a network of devices that can be accessed through the internet.These devices identify themselves and communicate through embedded technology. These devices and their networks can create vulnerabilities that can be exploited. Through these exploits, data can be stolen or devices hacked and controlled…
Biometrics and Access Control
What is meant by “Multi-modal Biometrics” for access control? Multi-modal Biometrics refers to a technological system that offers more than one biometric option to scan for access. Multi-modal biometric solutions can provide different types of authentication options. Multi-modal biometric systems can require single factor biometrics for access or can require…