Today's Edition: International Computer Security Day! ????

Today's Edition: International Computer Security Day! ????

The world celebrated?International Computer Security Day ?this week ?? and we couldn't be more be more excited here at Drata! With the growing number of?potential threats online each year, it's imperative that we stay diligent?in our efforts to protect ourselves from bad actors.?

Here are a few easy reminders to help keep you protected:

  • Keep your software and hardware up to date, and use a VPN to keep your network more secure.
  • Avoid suspicious attachments and links that may be sent through email. It's always a good idea to verify the email address of the sender.
  • Disable bluetooth connection when not in use to reduce security risk.
  • Enable two-factor authentication for stronger security. And don't be lazy with passwords!

Drata Bits?

???Drata Brings On New CRO and First-Ever COO to Fuel Hyper Growth

???Drata Amplifies AWS Partnership With ISV Accelerate Program and Foundational Technical Review


We're big fans of organizations who build a culture of security, and feel that it's a critical component for brands to build trust within their ecosystem. This week Ray Lambert, Drata’s Security Analyst, shared a few tips that you and your team can deploy today to further strengthen your security foundation.

Check out the video on?LinkedIn ?or discuss it here in the?Secured community .


From Drata's Experts

No alt text provided for this image

14 Free Cybersecurity Tools for Startups

Our team put together a roundup of?free cybersecurity tools ?to help jumpstart your security program.


No alt text provided for this image

Why Cybersecurity Asset Management Matters?

Discover the role?cybersecurity asset management ?plays in helping your organization protect itself from threats.


No alt text provided for this image

PCI DSS Compliance Cost: What It Takes to Become Certified

Need some help preparing for and budgeting for PCI compliance? Learn all about?PCI compliance costs ?here.



No alt text provided for this image

A Complete Guide to Cybersecurity Risk Management

Interested in scaling up your risk management program and plan? Hot off the press, our team of experts have just published a new guide that covers:

  • An overview of IT and cybersecurity risk management.
  • Why you need risk management.
  • How to make risk management work for your organization.

Access the guide here .


Around the Web

Resources and Articles From Trusted Sources

The following articles highlight great insight and experience from security reporters, vendors, and thought leaders.

Microsoft warns: This forgotten open-source web server could let hackers 'silently' gain access to your system ?| ZDNET

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer ?| Krebs

5.4 million Twitter users' stolen data leaked online—more shared privately ?| Bleeping


Secured Jobs

Jobs From the Community

Advanced Compliance GBB ?| Microsoft | United States (Remote)?

Sr. Compliance Manager ?| Spring Labs | Los Angeles, CA (Hybrid)

Senior IT Security Engineer ?| Lemonade | Tel Aviv District, Israel (Hybrid)

Special Agent: Cybersecurity/ Technology ?| Federal Bureau of Investigation (FBI) |?Los Angeles, CA?

Have a role you want listed? Reach out to us.


Trusted is produced by Drata's team of compliance and security experts.

Helpful Resources

Trusted is currently published twice a month and is designed to share the latest resources from around the compliance, risk management, and cybersecurity space. If you have suggestions or would like to include a recent article or podcast, please let us know.

???Secured , The Drata Community

↘??Trusted : Share our newsletter with others

???Upcoming Webinars

???Drata Customer Stories

要查看或添加评论,请登录

社区洞察

其他会员也浏览了