J3bitokjebitok.hashnode.dev·Jan 13, 2025Governance & Regulation (TryHackMe)This room covers the introduction to governance and regulation in cybersecurity, the understanding of relevant international laws, regulations, policies, standards & guidelines, the Governance, Risk Management & Compliance (GRC) framework, and intern...glba
Anton R Gordonantonrgordon.hashnode.dev·Jan 13, 2025Building Secure and Compliant AI Applications in the CloudAs artificial intelligence (AI) continues to transform industries, ensuring the security and compliance of AI applications in cloud environments has become paramount. Organizations must navigate complex regulatory landscapes while safeguarding sensit...Cloud
Eddi Freiterblog.freiter.com·Dec 8, 2024Simple and cost-effective MFA deployment with TOTPWritten by Eddi Freiter in collaboration with Will Neumann Organizations of all sizes are increasingly using productivity tools and applications hosted in the cloud. However, providing secure access to user information and sensitive data remains a si...MFA
Vanessa VillaforPangea Blogpangea.cloud·Oct 4, 2024Mastering HIPAA Access Control Requirements: A guide for DevelopersIntroduction Access control is a vital component of both operational security and compliance, especially in the Healthcare space. Access control systems help protect sensitive patient data, ensure the safety of patients and staff, and maintain the in...40 readsHIPAA
Subhanshu Mohan Guptablogs.subhanshumg.com·Oct 2, 2024Ensuring PCI-DSS, POPI, GDPR, and HIPAA Compliance in Kubernetes SystemsIntroduction Welcome to Part IV of my Kubernetes series, where we delve into building compliant systems on Kubernetes to meet stringent regulatory standards such as PCI-DSS, POPI, GDPR, and HIPAA. As businesses continue to adopt containerized environ...10 likes·56 readsMastering Kubernetespcidss
Chidinma Ozoemenachidinmawrites.hashnode.dev·Sep 27, 2024Understanding PCI DSS, HIPAA, and SDLCPCI DSS (Payment Card Industry Data Security Standard) PCI DSS is a set of security standards designed to ensure that all companies that handle credit card information maintain a secure environment. These standards were established by the Payment Car...SDLC
TATHAGATA ROYthreatradar.vercel.app·Sep 22, 2024Security Audit and Compliance Toolkit (Windows) – A Comprehensive Guide with Code WalkthroughIntroduction to Security Audit and Compliance Toolkit In today's digital landscape, ensuring the security and compliance of our systems is crucial. With threats ranging from unauthorized access to data breaches, organizations must regularly conduct s...151 readsSecurity
Anshul Tiwaricsanshul.hashnode.dev·Sep 3, 2024Cloud Security Posture ManagementCSPM or Cloud Security Posture Management is designed to monitor and manage cloud based system.It focuses on identifying mis-configurations, compliance violations and vulnerabilities across cloud services. Key features of CSPM - Continuous Monitoring...PCS-DSS
Tanishka Marrottcloud-design-diaries.hashnode.dev·Aug 26, 2024Governance, Risk and Compliance (Get to the Crux. No Fluff.)A lot of people treat security as if it's a separate entity altogether —That's where they miss the mark... The Security Strategy ∝ The Corporate Strategy Let's get to the crux - real-quick. 💡 — Q: What's governance? Overseeing -> Directing...1 likeCloud
Vanessa VillaforPangea Blogpangea.cloud·Aug 22, 2024Mastering HIPAA Audit Log Requirements: A Comprehensive Guide for Developers Building Enterprise Healthcare Systems"Your data may have been exposed". The reason you hear this statement is to meet compliance with the Health Insurance Portability and Accountability Act (HIPAA). This law is a critical aspect of protecting sensitive patient information and identifia...143 readsHIPAA