Show Filters
Filtering by Resource Type: Blog
Colorado following California and Virginia Privacy Regulations
What is the Colorado Privacy Act (CPA)? On July 7th of 2021 Colorado passed a comprehensive ...
Read More about Colorado following California and Virginia Privacy Regulations
Breaking Down Virginia’s Privacy law
What is Virginia’s Consumer Data Protection Act (CDPA)? In March of 2021, Virginia participated...
How does China’s Privacy Law impact your Organization?
What is the Personal Information Protection Law (“PIPL”)? As of November 1, 2021, the PIPL ha...
Read More about How does China’s Privacy Law impact your Organization?
What is API Penetration Testing
API Penetration Testing is a critical component of cybersecurity that focuses on assessing the se...
Everything You Need to Know about an Internal Penetration Test
In today’s digital landscape, the security of our systems and data is of paramount importance. ...
Read More about Everything You Need to Know about an Internal Penetration Test
Get Help With Your FedLine Self-Assessment
The Federal Reserve Banks created the FedLine Solutions Security and Resiliency Assurance Program...
If your organization handles sensitive health information, it’s likely that achieving or mainta...
HIPAA Safe Harbor Act Helps with Fines
The HIPAA Safe Harbor Bill was signed into law by President Trump on January 5, 2021. It amends t...
The Benefits and Risks of Penetration Testing
In today’s digital landscape, where cyber threats are ever-evolving, organizations are constant...
Read More about The Benefits and Risks of Penetration Testing
Develop the Best Data Privacy Framework
A data privacy framework provides a common approach for understanding and managing data privacy r...
ISO 27001 2022 Key Considerations and Transition Timeline
The International Organization for Standardization (ISO) 27001 standard is intended to help organ...
Read More about ISO 27001 2022 Key Considerations and Transition Timeline
Steer Clear of These 6 Common IAM Implementation Pitfalls
Today many companies are leaping at the chance to reduce administrative costs in the workplace. W...
Read More about Steer Clear of These 6 Common IAM Implementation Pitfalls
Defining Your FedRAMP Authorization Boundary
Obtaining Federal Risk and Authorization Management Program (FedRAMP) authorization is required f...
Read More about Defining Your FedRAMP Authorization Boundary
If you’ve ever had a compliance project in which you needed to demonstrate compliance with SOC ...
5 Steps to Successful HIPAA Compliance for Self-Insured Group Health Plans
Self-insured group health plans can offer significant cost and flexibility advantages for employe...
Read More about 5 Steps to Successful HIPAA Compliance for Self-Insured Group Health Plans
Tevora’s Okta Management Tool Helps Safeguard Your Valuable SSO Data
Single Sign-on (SSO) is an important part of any effective security strategy because it significa...
Read More about Tevora’s Okta Management Tool Helps Safeguard Your Valuable SSO Data
















