SOC 2 Readiness Assessment: All You Need to Know
Blog You’ve heard about SOC 2 audits, and you’re scrambling to ensure your organization is ready for this significant compliance task. Many must realize that the real work starts before even calling in a certified auditor with an efficient SOC 2 readiness...
All you need to know about SOC 2 audits
Blog A SOC 2 Audit is a set of guidelines and standards that’s been around for many years. It was originally intended as a voluntary standard to promote customer privacy protection but has since evolved into a key criterion in any thorough evaluation of...
Sneaky Orbit Malware Backdoors Linux Devices
Researchers have discovered a devious malware for Linux: backdooring devices and stealing data. The malware can alter the overall functioning of any device that it gets into. Popularly known as Orbit, the malware works differently from regular Linux threats. The...
The U.S. Health Organizations Targeted With Maui Ransomware
North Korea's state-sponsored ransomware operators have launched a campaign targeting healthcare organizations in the United States. This is according to an advisory issued by the Federal Bureau of Investigations (FBI) and the Infrastructure Security Agency (CISA)....
Vulnerabilities Found in Widely Used Robustel Industrial Routers
The Cisco Talos Threat Analytic and Research Unit has picked up several threats and vulnerabilities in the popularly used industrial cellular gateway IoT. The affected device, called the R1510, was created by a Chinese company called Robustel. The product is designed...
CISA Suggests That Organizations Use the Most Recent Version of Google Chrome
Blog Users and administrators should update to a new version of Chrome released by Google last week to address seven flaws in the browser, according to the US Cybersecurity and Infrastructure Agency (CISA). Google published an advisory on January 6, 2019....
Beware the ‘Secret Agent’ Cloud Middleware
Last Thursday, at RSA Conference in San Francisco, the researchers from Wiz.io unveiled an open-source cloud middleware database on GitHub that details the particular middleware agents that Amazon Web Services (AWS), Google, and Microsoft put on their cloud customers'...
Catchpoint Achieves ISO/IEC 27001:2013 Certification Streamlined by TrustNet
Catchpoint®, the worldwide leader in digital experience observability, announced today that it has successfully completed ISO/IEC 27001:2013 accreditation. TrustNet – global cybersecurity and compliance service provider, helped streamline the formal audit procedure...
What is a SOC 1 report?
A SOC 1 report is an evaluation of a company's internal controls related to financial reporting. The purpose of a SOC 1 report is to give organizations comfort that their service providers have adequate controls and procedures in place to protect their data and...
TrustNet Wins “Editor’s Choice in Managed Security Service Provider (MSSP)” at #RSAC 2022
Blog SAN FRANCISCO (BUSINESSWIRE) JUNE 6, 2022 – TrustNet is proud to announce we have won the following award from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine: “Editor’s Choice in Managed Security Service...