News

8 Ways Compliance Automation Saves You Time

Organizations today spend a lot of time and money implementing new strategies and overseeing compliance with cybersecurity policies, legislation, and regulations. Businesses in the financial sector specifically need to ensure that their operations are resilient to minimize the risk of extensive disruptions. Businesses face the threat of disruptions due to many factors, and effective cybersecurity 8 Ways Compliance Automation Saves You Time

Risk is more than IT Security

Expanding the Reach of Risk for all Companies Much like the game of risk, in which the objective is to take political control and conquer the world, business risk requires some of the same methods to succeed. Not only do you need an army, but you need the capacity to highlight and show value to Risk is more than IT Security

Critical Zero-day Remote Code Execution Vulnerability found in Atlassian Confluence

Atlassian has released a security advisory to address a remote code execution vulnerability (CVE-2022-26134) affecting all Confluence Servers and Data Centers. Atlassian has confirmed that all supported versions of Confluence Server and Data Center are affected; however, currently, there are no fixed versions of the products available. The security advisory was released after security researchers Critical Zero-day Remote Code Execution Vulnerability found in Atlassian Confluence

Why we Build our Integrations In-House

As operational costs of managing bespoke systems increase, so does the push for companies to embrace the efficiency and ease of SaaS platforms. The landscape has changed in modern business; the ability to spin up an instance of an application in the cloud allows quick changes to the latest and greatest feature-rich product. This comes Why we Build our Integrations In-House

Renovating your IT Security and Compliance Program

If one thing is sure, the threats companies face each year continue to evolve. 30 years ago, the focus was on reducing the office secretary taking home their favorite office supplies and printer consumables or stealing the petty cash. Threats of today are much more significant in nature and complexity. We can all read about Renovating your IT Security and Compliance Program

Cyberattacks Escalate Conflict Around the World

Wanted hackers coding virus ransomware using laptops and computers. Cyber attack, system breaking and malware concept

Gone are the days of the typical war scenario. The cannon fodder has since been replaced by cyber influence and online resources that have far more impact in destabilizing governments and increasing fear among its citizens. We’re seeing the effects of this most recently through the tensions between Russia and Ukraine. According to the US government, Cyberattacks Escalate Conflict Around the World

Facing the InfoSec Problem – and Creating the Solution – From the Inside

This is the Compyl branded image

The concept for Compyl came from years of on-the-job experience our co-founders, Stas Bojoukha and Simon Shaddock, had while holding CISO roles for large enterprises. They continued to see the same issues surfacing when implementing information security and compliance programs. A robust program requires cost-prohibitive tooling, lengthy implementation, large teams to share the workload, and Facing the InfoSec Problem – and Creating the Solution – From the Inside