Recently Digital Edge’s CEO, Micheal Petrov, was welcomed as a guest speaker for CTG Intelligence Managed Security Services Forum (#MSSTriState).
Suppose you’re implementing new technology to secure your business. Whether you’re updating your current system or looking for ways to support a hybrid or remote working model, you need to be aware of the top security trends.
So, which are the new security trends you need to be aware of when implementing new technology to protect your business?
Keep reading for a complete guide to the top security trends, from technologies that support hybrid working to technologies that ensure your system can keep up with the changing demands of the security landscape.
FundCount has partnered with Digital Edge in the AWS realm to provide a wide range of DevOps and SysOps services to FundCount SaaS clients. Digital Edge successfully collaborated with FundCount to architect, deploy, and support the award-winning Accounting, Analysis, and Reporting software hosted on AWS.
Digital Edge just guided a NASDAQ listed technology firm to SOC 2 Type 1 compliance. This client told us in late November 2021 that it was crucial that they get their SOC 2 certification letter by the end of January 2022. This did not leave us with much time to get their house in order, but they had important customers requiring SOC 2 compliance in order to continue doing business with our client.
Financial institutions rely heavily on outsourced service providers (OSPs) to assist with key business objectives.
As financial institutions are ultimately responsible for the service provided to their customers, OSPs must comply with the standards and controls accepted within the financial industry.
The Association of Banks in Singapore has established the Guidelines on Control Objectives and Procedures for all OSPs desiring to work with the numerous financial institutions in Singapore. To demonstrate your organization’s ability to meet these guidelines, an Outsourced Service Provider Audit Report (OSPAR) attestation is mandatory. Without an OSPAR attestation, your organization will not be able to provide services to the rapidly growing number of financial institutions in Singapore.
Digital Edge will ensure that your organization will receive an OSPAR attestation as proof that it has implemented adequate cybersecurity safeguards to maintain the governance and consistency required. With OSPAR, your company will be ready to conduct business, and guarantee the security of your client’s critical information.
We are a leading IT company and AWS Partner which is headquartered in New York, yet staffed globally. Indeed, even prior to the disruption brought on by the Covid pandemic, we had a decentralized organization where the talent we sourced was more important to us than where our talent was sourced. With this as a guiding principle, we as many other IT firms tended to have substantial staff located in Ukraine.
It all worked great for many years as a win-win-win for our Ukrainian staff, which was happy to be employed by a US firm (and to be paid in US dollars); for our clients which were happy with a work product that exceeded expectations; and for Digital Edge, which was happy to have happy clients (and to be paying competitive, albeit steadily, rising compensation in US dollars).
The big IT problem facing many companies today is the recent explosive growth in privacy and cybersecurity laws they must comply with.
Digital Edge is proud to announce that one of our strategic cybersecurity advisors, Aleksandr Kondratiuk, has successfully received the ISO-27001 Lead Auditor certification! The certification exhibits our team's ongoing commitment to assist our clients better and grow our professional skills.
Digital Edge is proud to announce that we successfully assisted and obtained an OSPAR certification for one of our FinTech clients.
What is OSPAR? OSPAR (Outsourced Service Providers Audit Report) is a report that can only be issued by one out of 5 accredited auditors. It is a critical pre-requisite for the 3rd party vendors, to demonstrate their adherence to stringent guidelines & best practices if they wish to conduct business in Singapore.
Usually my blog posts are focused on the arguably mundane practices of cybersecurity governance. Today, though, I would like to get into something a bit spicier. Right now, as I write this, Russia has about 90,000 troops amassed at the Ukrainian border, and China has been harassing Taiwanese airspace for months. Some kind of aggressive action, possibly cyber-related, seems very possibly forthcoming; and with it, likely a response in kind.
It’s a known fact that Russia, China, North Korea, Iran and others engage in regular cyber attacks against the other countries including the US. We see this all the time. What I think is unclear to most people are the rules governing the responses to such attacks. Below I discuss a broad overview of how cyber attacks are handled by governments around the world.
First off, you should know that the international law around the rights self defense of a state actor is extremely murky and highly disorganized. Furthermore, different countries disagree on the interpretation of laws that exist. That being said, there are some general rules that are followed by responsible governments.