What is a Network Security Engineer? Whether you are looking to find your nearest Network Security Engineer or simply wanting to find out more about what a Network Security Engineer does; this complete guide will answer all your questions. Ever wondered about a security engineer salary or what network security jobs are available? We cover all this, along with […]
Monthly Archives: October 2018
The Complete Guide to SAS 70, SSAE 16, SSA18, and SOC Comparisons What does SAS 70 stand for? SAS 70 stands for Statement on Auditing Standards No. 70 and is classified as a particular standard of authority which was developed and designed by the American Institute of Certified Public Accountants (AICPA). What does SSAE 16 […]
What Does PCI Compliance Mean? PCI stands for Payment Card Industry and forms part of a broader Information Security set of standards that are typically referred to as PCI DSS. The Payment Card Industry Data Security Standard is essentially a group of procedures and policies that sets out a number of key ways to help […]
SOC 2 Reports otherwise known as Service Organisation Control were originally introduced in 2011 by the American Institute of CPAs (AICPA). A SOC 2 type 2 report plays a significant role in compliance and data security. There are three different types of SOC reports, in this post, we specifically address the question, what is a SOC2 […]
What is HIPAA Compliance? Also referred to as the Health Insurance Portability and Accountability Act, this was originally introduced in 2016 as US legislation that is aimed with addressing security provisions and data privacy for the safeguarding of medical data. The HIPAA Compliance Standards ensure that companies who have dealings with PHI (Protected Health Information) need […]
API Scanner Why You Need an API Scanner API Security Scanning is an essential tool to help you secure IOT devices, mobile backends, and web services. In this post, we provide an in-depth overview of API Scanners along with what they do, why they are important, and what particular vulnerabilities they can protect against. FOCUS: To address web-based APIs such […]
Data Storage When people think “high performance” on server and systems infrastructure, they think of things like RAM (memory), and CPU (processor). When building out this equipment, they will usually lavish boatloads of both, to ensure their systems and infrastructure are performant. But, all too often, one of the most important and least acknowledged part of an infrastructure-build, […]