CMMC for External Service Providers – What the Final Rule means for you
The long-awaited Cyber Maturity Model Certification (CMMC) officially launched in December 2024, and certification assessments authorized to begin as of the start of this year. With these launches, the colossal task of moving hundreds of thousands...
Read More about CMMC for External Service Providers – What the Final Rule means for you
Show Filters
Double Take on Data Governance: 2 Reasons Why Security Execs are Reconsidering Their DLP Strategy
Since the end of last year, Tevora has recognized a noticeable uptick in security executives reev...
Tevora’s vendor management programs include key areas that organizations need to address to sta...
Understanding PCI DSS 4.0: Addressing eSkimming and Data Privacy Risks
In this webinar recording, join Tevora – one of the world’s foremost PCI QSACs, and S...
Read More about Understanding PCI DSS 4.0: Addressing eSkimming and Data Privacy Risks
Vendor Selection: In-house or Outsourced
Occasionally, I encounter companies that want to conduct their own penetration testing. They ofte...
Cyber Warfare Playbook: Offensive Strategies for Resilient Organizations
While traditional cybersecurity approaches often focus heavily on defensive measures such as fire...
Read More about Cyber Warfare Playbook: Offensive Strategies for Resilient Organizations
ISO, CSA STAR, & International Equivalent
Tevora provides compliance guidance for meeting ISO and other international equivalent standards ...
Final Countdown: Understanding and preparing for the Texas Data Privacy and Security Act (TDPSA)
The Texas Data Privacy and Security Act (TDPSA) is a consumer privacy law similar to ot...
Threat Hunting in the Age of AI: Before and After the Advent of Artificial Intelligence
Join Tevora and Cranium as they delve into Artificial Intelligence (AI) and how it is changing th...
Identity Resilience: The Missing Piece to Securing Your Identities
Most conversations around Identity Resilience focus on the prevention of attacks. But as statisti...
Read More about Identity Resilience: The Missing Piece to Securing Your Identities
Exploring New Dimensions of Supply Chain Security in NIST CSF 2.0
2023 Saw a Surge of Software Supply Chain Attacks In 2023, the cybersecurity landscape witnessed ...
Read More about Exploring New Dimensions of Supply Chain Security in NIST CSF 2.0
Countdown to Compliance: Understanding the shift from ISO 27001:2013 to ISO 27001:2022
Today, we’re tackling a crucial topic for organizations worldwide: the transition from ISO 2700...
Should HITRUST e1 be your number 1?
Join Tevora’s HITRUST expert, Justin Graham as he dives deep into the distinctions between ...
The Art of Scoping – A guide to effective Penetration Testing
Fundamentals Penetration testing is distinctly different from vulnerability scanning in one cruci...
Read More about The Art of Scoping – A guide to effective Penetration Testing
ISO/IEC 42001 provides organizations with a structured approach to managing AI projects, balancin...
AI compliance refers to the process of ensuring that companies remain compliant with new and emer...
Unveiling PCI v4.0: Navigating Upcoming Changes Through Targeted Risk Assessments
As the upcoming date for PCI DSS v3.2.1 to be retired and v4.0 to transition in its place, organi...
Read More about Unveiling PCI v4.0: Navigating Upcoming Changes Through Targeted Risk Assessments