Skip to main content

Security Compliance

From FedRAMP to GDPR, we’ll help you understand the security requirements of every compliance and regulatory standard. Learn how you can prove compliance.

Why you should create a security.txt file if you have a VDP or bug bounty program
Security Compliance, Vulnerability Management

What Is a Security.txt File and How Can It Help Your Program?

Security.txt is a security mechanism that allows your organization to provide its vulnerability disclosure policy and contact information in a...

Easy and secure Credential Management
Security Compliance, New Features

Easy and secure Credential Management

The new credential management functionality enables program owners to share credentials with hackers in the...

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500
Security Compliance, Company Resources

Highlights of New York’s Cybersecurity Regulation 23 NYCRR Part 500

Effective March 1, 2017, the New York State Department of Financial Services (NYDFS) promulgated 23 NYCRR Part...

Hey Startups, Check Your GDPR Progress with this GDPR Checklist
Security Compliance, GDPR, Company Resources, Compliance

Hey Startups, Check Your GDPR Progress with this GDPR Checklist

The GDPR Checklist is just that: a checklist to make sure you’ve covered the basics concerning GDPR. It’s...

Q&A with CRANIUM: Easing Compliance with “GDPR in a Box”
Security Compliance, GDPR, Compliance

Q&A with CRANIUM: Easing Compliance with “GDPR in a Box”

CRANIUM, an international consulting company specializing in privacy, data protection and information security...

Q&A with Jane Frankland: GDPR, CISOs, and Women in Cybersecurity
Security Compliance, Company Resources, GDPR, Expert Interviews, Compliance

Q&A with Jane Frankland: GDPR, CISOs, and Women in Cybersecurity

Jane Frankland is an award-winning entrepreneur, speaker, and consultant in cybersecurity and entrepreneurism...

What percentage of your software vulnerabilities have GDPR implications?
Security Compliance, Company Resources, Data and Analysis, GDPR, Compliance

What percentage of your software vulnerabilities have GDPR implications?

Do you know how many of your unknown vulnerabilities have the potential to cause a breach of consumer data? In...

Bringing Private-sector Security into the U.S. Government [Security@ Recaps]
Security Compliance, Security At Event

Bringing Private-sector Security into the U.S. Government [Security@ Recaps]

“Hacking the U.S. Government” was the first panel discussion at Security@ SF, and it proved to be as...
The ICO’s 12-Step Guide to GDPR Compliance
Vulnerability Disclosure, Security Compliance, Company Resources, GDPR, Compliance

The ICO’s 12-Step Guide to GDPR Compliance

The United Kingdom’s Information Commissioner’s Office suggested “12 steps to take now” to get ahead of GDPR’s...