Author: Pansy

Pansy is an ISC2 Certified in Cybersecurity content marketer with a background in Computer Science engineering. Lately, she has been exploring the world of marketing through the lens of GRC (Governance, risk & compliance) with Sprinto. When she’s not working, she’s either deeply engrossed in political fiction or honing her culinary skills. You may also find her sunbathing on a beach or hiking through a dense forest.
    cloud security controls
    ,
    A Guide to Cloud Security Controls and Frameworks
    Cloud security controls are anything and everything that protects your cloud infrastructure from cyber threats and attacks. It ranges from identity and access management (IAM) to network security, encryption, and compliance monitoring. There are some basic cloud security examples that you must be aware of and some complex ones that may be needed in a…
    Security posture
    ,
    What Is Security Posture and Why It Matters?
    According to data by SpaceLift, over 96% of businesses are using public cloud systems rather than on-premise systems. While this is no surprise due to the massive adoption of cloud infrastructure, the problem begins when providers and customers are not aware of the vulnerabilities in their security posture, which can lead to data breaches, account…
    Third party risk management
    ,
    A Complete Guide to Third-Party Risk Management
    No CTO in their right mind trusts their vendors and contractors completely. Irrespective of their relationship, vendors will need to fulfill a due diligence baseline to qualify as a good fit and a safe choice. But what separates your company from being a secure one from a vulnerable one is the depth of your due…
    Benefits Of ERM
    ,
    Top Benefits of Enterprise Risk Management (ERM)
    With 70% of organizations operating from the cloud and statistics validating that no industry is immune to security risks, ERM has become a must-have for enterprises, if not essential.  Enterprise risk management forms the crux of a scaling business as it is directly connected to organizational goals. It integrates all kinds of risks faced by…
    List of Examples of HIPAA Violations
    ,
    List of Examples of HIPAA Violations
    HIPAA (Health Insurance Portability and Accountability Act) is a federal law that the U.S. passed in 1996 for the healthcare industry. Its main aim is to protect the privacy and security of a patient’s health information.  HIPAA has two main rules: the privacy rule and the security rule. The security rule enforces the privacy rule…
    Risk Monitoring
    ,
    Risk Monitoring: From Reactive To Proactive
    Imagine you’re the captain of a ship, and you spot a massive iceberg on your way ahead. Do you change course or hope for the best? How did you spot the iceberg in the first place? Gone are the days of manual monitoring, like on the Titanic; icebergs are now spotted with satellite imagery, aerial…