Skip to content

Security Insights

Explore insights and recommendations by security experts from the world of cybersecurity

What are the new controls added to ISO 27001 in 2022?

ISO 27001 is a globally respected information security standard. It is officially referred to as ‘ISO/IEC 27001’ and is part of the ISO/IEC 27000 family of standards for information security…

Top 5 CMMC Implementation Gaps

CMMC is a security framework that is mandatory for contractors who want to work with the Department of Defense (DoD). It is based on the US National Institute of Standards…

Security Tech Investments for Top 10 trends in 2023

How do you prevent cyberattacks from impacting your business operations? This is the big question organizations have been asking in the wake of growing cyberattacks across industries. A growing number…

SOC 2 Type 2 Audit for SaaS Companies

Getting a SOC 2 Type II Report can be a game-changer for a SaaS Company. It can transform how you respond to RFQs and how you assure potential leads that…

Challenges you may face with a SOC 2 auditor

A SOC 2 certification / examination is pursued by service organizations who want to prove to potential customers that they can manage their data effectively. Typically a SaaS provider, Managed…

Anatomy of a Ransomware Attack and Lessons Learned

The average ransomware attack caused $1.85 million in losses to the company in 2021, up 41% from 2020. This estimate factors in  the amount paid, downtime, expense for IT technicians,…

How to Select a Security Vendor

According to the 2022 Verizon Data Breach Investigations Report, 62% of network breaches occurred through an organization’s partner. Statistics like this challenge the notion that having security vendors and sharing data…

7 Benefits of SOC 2

A SOC 2 Report helps organizations to prove their commitment to customer data security and meet the eligibility criteria of a potential client’ RFQ. More and more clients have been asking for…

What is SOC 2?

SOC 2 is a compliance standard for service organizations, developed by the American Institute of CPAs (AICPA). It specifies how organizations should manage customer data. The SOC 2 framework is applicable…

databrackets is an Authorized C3PAO for CMMC

We are thrilled to announce that databrackets is an authorized Certified Third-Party Assessment Organization (C3PAO) — a milestone that reflects our deep commitment to cybersecurity excellence and integrity in the
Read More

Understand Cyber Liability Insurance Coverage, Policy Language and How your Premium is Calculated

When a ransomware attack locks your systems, or a data breach exposes customer information, cyber liability insurance becomes the financial safety net between recovery and significant loss. Yet most organizations approach this
Read More

How to Reduce your Cyber Liability Insurance Premium with a Security Risk Assessment

IBM reports that the average cost of a data breach in 2025 was $4.44 million globally. However, in the United States, the average cost was significantly higher at $10.22 million.
Read More

NEN 7510: A Guide to Healthcare Information Security in the Netherlands

When a ransomware attack hit Maastricht University in December 2019, the entire digital infrastructure collapsed. Nineteen thousand students couldn’t access course materials, researchers faced looming grant deadlines with no access
Read More

Understanding the CAIQ

Is CAIQ for You? Are you evaluating cloud service providers and drowning in security questionnaires? Do you need to prove your cloud vendor did their due diligence before the next
Read More

NIST SP 800-53 – The Gold Standard for Cybersecurity

NIST Special Publication 800-53 is the backbone of federal cybersecurity that protects everything from your Social Security data to national defense systems. But what most people don’t realize is that
Read More

Securing CUI with NIST SP 800-171 Revision 2

NIST SP 800-171 Revision 2 stands as the mandatory cybersecurity standard for any organization handling Controlled Unclassified Information (CUI) under federal contracts. This isn’t voluntary guidance or a best-practice recommendation.
Read More

Building a Practical Cybersecurity Program with NIST CSF

How do you build a cybersecurity program that’s both comprehensive and practical- without breaking the bank or overwhelming your team? The answer lies in a framework that strips away complexity
Read More

Understanding the NIST AI Risk Management Framework

The question isn’t whether AI will transform your business—it’s whether you’ll manage the risks before they manage you. Every day, AI systems make thousands of decisions that affect real people:
Read More

Trusted by Hundreds of Companies

Do you want to become a databrackets Consultant?

We Are Here to Help You