Cybersecurity

Test the Security of Your Information Systems: A Penetration Testing Case Study

Penetration Testing Case Study A-LIGN

One of the best ways to test your information security posture is to simulate realistic attacks through a penetration test. Penetration testing is designed to test the information security of the technologies and systems in place at your organization, identifying vulnerabilities that can lead to a data breach or security incident.

Read More

Cloud Security for CSPs: It’s Up to You AND Your Clients

Cloud Security for CSP Blog A-LIGN

How can you as a Cloud Service Provider (CSP) improve the security your clients are demanding of you? 

Read More

SEC Issues First Civil Penalty for Failure of Data Breach Disclosure

SEC Penalty Data Breach Disclosure

On February 21, 2018, the U.S. Securities and Exchange Commission (SEC) announced an update to its cybersecurity guidance that was first introduced in 2011 regarding a public company’s disclosure obligations related to cybersecurity.

Read More

SEC Approves Cybersecurity Guidance Revision

sec-approves-cybersecurity-guidance

Over the past year, cyber threats and risks have drastically increased in severity creating critical information security challenges, many of which have resulted in data breaches.

Read More

Government Agencies Fight to Regulate Cryptocurrencies

regulating-cryptocurrency

News headlines continue to discuss the popular topic of cryptocurrencies. Whether it’s bitcoin or blockchain, the emerging technologies and concepts continue to impact and complicate the business world.

Read More

Security Considerations for Using Blockchain Technology in Healthcare

Cybersecurity-Blockchain

Businesses continue to innovate and adopt new technologies with the goal of making operational processes more efficient. Recently, the newest technology trend, blockchain, has gained much attention from companies, technology innovators, and regulators. Although the technology itself is not new, it’s adoption into the commercial world is.

Read More

A-LIGN’s Commitment to Quality

Commit-to-quality

What does it mean to be committed to quality? Through our quality assurance process and team, and accreditations, A-LIGN ensures that your organization receives a quality report that meets the guidelines set by the relevant audit standard. Our reports satisfy third-party inquiries and exceeds customer expectations by upholding the highest standard of work.

Read More

Board Members and C-Levels: Are You Ready for 2018 Cybersecurity Risks?

2018-Cyber-security-Risks

Within the last year, multiple laws and regulations have significantly increased cybersecurity risk management responsibility for board of director members and C-level executives. Let’s review four of these developments to ensure you have a plan in place to meet the requirements.

Read More

PCI DSS v3.2 and the Penetration Testing Requirements for Service Providers

Penetration-test-PCI

In April 2016, the Payment Card Industry Security Standards Council (PCI SSC) released PCI Data Security Standard (PCI DSS) version 3.2.  With the updates came clarification to requirements, additional guidance, and the additional seven new requirements.

Read More

The Uber Security Breach: 3 Takeaways to Secure Your Organization

uber-breach

In October 2016, Uber the global car sharing company, experienced a massive breach whereby hackers stole personal data from approximately 57 million users and drivers. After a year of concealment without regulatory notice and payment to the hackers to destroy the data, Uber finally disclosed the breach. As a result, Uber has undertaken a large […]

Read More