Skip to content

Author: Srini Kolathur

Read the latest articles and news from the world of cybersecurity.

Cybersecurity Best Practices

Keeping yourself protected from cybercrime isn’t just about having the latest security solutions. Good IT security practices, including regular training for employees, are essential components of every single security setup.
Read More

What is the difference between an Audit, Assessment and Certification?

Working on contracts for B2B, B2G, or B2C engagements can be daunting. The intense focus on proving the security and privacy of your systems is usually at the heart of
Read More

What are the rules of HIPAA Compliance?

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a set of mandatory standards for all organizations that work with Protected Health Information (PHI) of US Residents. It
Read More

What is Protected Health Information (PHI)?

HIPAA stands for the Health Insurance Portability and Accountability Act of 1996. It is a set of mandatory standards to manage the use and disclosure of healthcare data, known as
Read More

Who is covered under HIPAA?

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is applicable to all entities in the Healthcare Industry. It outlines the rules and regulations with regard to the use
Read More

7 Benefits of HIPAA Compliance

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) outlines the rules and regulations with regard to the use and disclosure of Protected Health Information (PHI) by all businesses
Read More

What is HIPAA?

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a set of mandatory standards to manage the use and disclosure of Protected Health Information (PHI). It is mandatory
Read More

Comparing NIST, ISO 27001, SOC 2, and Other Security Standards and Frameworks

Over the last decade, an increasing number of organizations have been demanding security and compliance based certifications before awarding contracts to SaaS and other service providers. This has lead to
Read More

Top 5 Things You Should know about SOC 2 Compliance

Introduction SOC 2 provides valuable insights into your organization’s security posture at any given time. It is an auditing procedure and a crucial framework that applies to all technology, product,
Read More

databrackets Is Accredited To Provide ISO/IEC 27001 Certification

databrackets received accreditation by the International Accreditation Service (IAS) to provide ISO 27001 Certifcation.
Read More