SOC Reporting options
When considering the broad spectrum of services provided by outsourced service providers in today’s marketplace, some service types lend themselves clearly to one SOC reporting option over another. To best understand the reporting options, it’s important to consider the intended use and audience in each case. There are three SOC [...]
Secure Your Apps with E Com Mobile App Security Testing Checklist
Like all software, mobile apps often contain vulnerabilities (introduced by errors in design or implementation or by malicious intent) that can expose a user, a mobile device and its data or enterprise services or its data to attacks. Any one of many simple errors that a developer can make potentially [...]
Joker Malware Infects 500K Users In 24 Android Apps On Google Play
A new Android malware called Joker (after the manic Batman villain) has been discovered which can gain access to a victim’s SMS messages, contacts list, and other specific device information. It can also sign victims up for premium subscription services without their knowledge. The malware has been reported to have [...]
Soc 2 Control Mappings against multiple standards
Third party organisations that successfully complete a SOC 2+ audit can offer their clients reasonable assurance to demonstrate that effective internal controls are in place and these controls pertain to the criteria covered in the AICPA Trust Service Principles, as well as many of the detailed requirements covered in other [...]
How to achieve HIPAA Compliance for Medical Software applications?
In relation to medical software applications, the term HIPAA compliant means that the application meets the technical and physical safeguards of the HIPAA Security Rule. If you are hosting an application in a HIPAA-compliant environment then it does not make the application HIPAA-compliant. If you build an eHealth or mHealth [...]