TrustNet team attends RSA Conference 2023: Our Impression and Thoughts
TrustNet team attends RSA Conference 2023 to stay ahead of cybersecurity, receive awards, and decipher Frisco’s charms Every year since 1991, IT companies showcase their products and services at a venue where the world’s preeminent organizations and thought leaders...
SOC 2 Questions & Answers
Protecting sensitive data has become essential for gaining customer trust in today's technology-driven world. To demonstrate their commitment to information security, businesses use several security frameworks, of which SOC 2 is one of the most rigorous and widely...
PCI Compliance Fines 2023: All You Need to Know
Blog The penalties levied under PCI can run to several hundred or hundreds of thousands of dollars. To avoid these penalties, you need to be PCI-compliant. PCI compliance refers to all measures taken to secure both businesses and their clients from any risks...
Cybercriminals Are Getting Faster at Exploiting Vulnerabilities
The race continues over which side of cybersecurity will gain the upper hand in the next few years. There are some good news and a few alarming ones. But one detail stands out in the 2022 study by Rapid7: the bad side appears to be gaining speed. Rapid7's...
Microsoft Sounds Alarm on Ransomware Threats to Apple’s MacOS
Apple's macOS, known for its security features and stability, has long been considered a haven for users who want to keep their devices and data secure. However, recent findings by Microsoft security researchers suggest that this perception may no longer be accurate....
Drizly CEO Facing Unprecedented Sanctions for Data Privacy Violations
Online alcohol delivery service company, Drizly and its former CEO are facing a series of sanctions from the Federal Trade Commission (FTC) for violating data privacy rules. The FTC has imposed unprecedented personal liability on the former CEO, which will impact him...
Information Security Plan: What It Is, Why You Need One, and How to Get Started
Blog Every organization needs an information security plan because data has become the world’s most valuable commodity. And like all precious things, data is regulated heavily by governing bodies and coveted by everyone – including crooks. That is why...
Hack the Pentagon 3.0: Shifting Focus to Facility Control Systems
The Department of Defense's bug bounty program, known as Hack the Pentagon, is launching its third iteration. This time, it will focus on the facility control system network. The third iteration of the program, which is known as Hack the Pentagon 3.0, will look into...
Code-Injection Bugs Bite Google, Apache Open-Source GitHub Projects
Two of the most popular open-source ventures have identified several weaknesses, Google and Apache. The vulnerabilities may be used to access various proprietary information stealthily and provide access to lateral movement in a firm. Moreover, the glitch may be used...
AICPA Updates SOC 2 Guidance: What’s Changed?
The AICPA has revised and updated the SOC 2 guidelines. There are no changes to the SOC 2 trust services criteria (commonly referred to as control objectives) however, there are new and revised “points of focus.” At the core, the points of focus provide...