Operations | Monitoring | ITSM | DevOps | Cloud

Compliance

Governance, Risk and Compliance for MSPs in 2023

RedLin Murphy, N-able’s head of Governance, Risk and Complaince, as well as Dave MacKinnon, N-able’s Chief Security Officer discuss current and upcoming regulations that do or could impact MSP’s, what you can do to prepare for these things as cyber governance continues to at both the state and federal levels.

Building a Compliance Report based on inventory modules

In CFEngine Enterprise we collect information from each system in the infrastructure as inventory. Some inventory is available by default, and more can be added using modules or writing policy. You can use inventory information to create a Compliance Report with checks that determine if the information complies with your security requirements. In this blog post, we will use some modules from CFEngine Build which provide inventory data, and build a Compliance Report on top of those.

5 Ways to Keep up with Changing Compliance

Businesses must constantly deal with changing compliance regulations, especially in highly regulated industries like healthcare and finance. New rules and policies are being introduced from time to time, and organisations must adhere to these. So, how can businesses remain compliant amidst the changing policies? Below, find out some ways to keep up with changing compliance.

Puppet supports DoD continuous compliance and configuration management

Puppet Enterprise now offers Compliance Enforcement Modules aligned to DISA STIGs Benchmarks. The Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) were built to safeguard our most critical security systems and data against a dynamic threat environment, yet monitoring and enforcing widely deployed infrastructure at the U.S. Department of Defense (DoD) scale is a formidable task.

Announcing PCI-Compliant Log Management and APM from Datadog

For any organization that stores, processes, or transmits cardholder data, monitoring can pose a particular set of challenges. The Payment Card Industry (PCI) Data Security Standard (DSS) dictates rigorous monitoring and data security requirements for the cardholder data environments (CDEs) of all merchants, service providers, and financial institutions.

Sponsored Post

Monitoring Transaction Log Files for PCI compliance

File Integrity Monitoring, aka as FIM, is a must-have feature for anyone in charge of security. With FIM, one can detect when a critical file, such as a file that belongs to the Operating System, or a key configuration file, is changed. In most cases, configuring FIM is straightforward: If the file changes then generate an alert.

Internal Social Media Platforms and Risk Management

Whether you're in the IT, finance, or HR departments of any company, chances are high that your team is using some form of social media to collaborate on projects. While internal social media platforms may boost employee engagement, knowledge sharing, and day-to-day decision-making, they also pose a variety of hazards in compliance and litigation that are often neglected. The following are some potential dangers you should be aware of before implementing internal social media in your business, along with suggestions for coping with such dangers.