


CIS Critical Security Control 3 v8: Improving organizations data protection strategy
Know in depth the CIS Security Control 3 v8, a set of security safeguards to help organizations on data protection, the new changes compared to v7, all the safeguards and how to implement CIS Control 3 effectively. TABLE OF CONTENTS 1. A brief background about data...
TISAX® Compliance, Certification & a Data-Centric Security Approach
TISAX, Trusted Information Security Assessment Exchange, is the automotive industry standard certification that consists of three levels. In the following article you will learn what is Tisax, why you should get the certification, who does TISAX apply to, the process,...
How to calculate the cost of a data breach – A Case Study
Every day there are news related to companies and public organizations that have suffered a data breach due to an external attack, human error, or negligent actions on the part of employees or former employees. We see that around these news there is data that the...
Data Processing Agreement, International Transfers and Regulations
In this article we will discuss the implications of the Personal Data Processsing Agreement (DPA) required by the Regulation. This have recently become particularly relevant, more specifically, about data transfers to countries outside the European Union where the...
How can the Zero Trust model help with CMMC and NIST 800-171 compliance?
What is CMMC (Cybersecurity Maturity Model Certification)? The CMMC program, Cybersecurity Maturity Model Certification, was pioneered by the U.S. Department of Defense to measure and verify the level of implementation of processes and practices in the area of...
How to comply with financial sector regulations through a data-centric approach to security
In the following article you will find all the data protection regulations for financial services, as well as the security risks they face. Finally, we recommend 5 best practices to comply with these regulations effectively. Table of Contents: Risks in financial...
Compliance with the SAMA framework through a data-centric cyber security approach
In previous articles and resources, we have shown how SealPath can help improve security in different use cases within an organization, or facilitate compliance with data protection regulations such as EU-GDPR, Health environment, etc. In this article we will show how...
GDPR in the Health Sector
GDPR has had a great effect on the health sector, pharmaceutical and biotechnology industry. Health organizations are increasingly facing new threats in cybersecurity, and must handle them in the most effective way for their business. The Impact of GDPR for Health...