How Long Does SOC 2 Compliance Take and How Can You Get Certified?

how to get soc 2 compliance

It seems like a long project to reach SOC compliance, right? Well, not if you consider that SOC 2 compliance is a journey and not just a tick box certification. SOC 2 will enable you to embed processes and controls to improve security maturity – demonstrating the operating effectiveness of these controls. How long does […]

Why Cyber Essentials is Not Just a Tick Box – Interview with Dr Emma Philpott

As the question ‘why do I need a Cyber Essentials certification?’ continues to arise, Dr Emma Philpott, the Director and CEO of the IASME Consortium Ltd, answers intriguing questions and provides enlightening responses from her point of view in a recent webinar with Risk Crew. Give yourself a moment out of your day & enrich […]

“Kite in a Storm” Web Administrator to Remote Code Execution

Remote Code Execution

Researchers at ZX Security discovered a chain of vulnerabilities that ends with Remote Code Execution in the Accellion Kitework® framework. Kiteworks is a secure file-sharing platform targeted at enterprise audiences that facilitates sharing, syncing, and modifying files between internal and external users on multiple devices. CVE 2021-31585 was discovered in the administrative functionality, specifically the […]

Join Us At The Big CISO 360 Event

CISO

Don’t leave without reading about this invigorating event hosted by Pulse Conferences celebrating the 5th anniversary of the CISO 360 Congress. And guess what, it’s NOT VIRTUAL but Hybrid.💃 We, Risk Crew will be sponsoring this event and we are looking forward to meeting you in person at Victorian Gothic Mansion House Oakley Court, Windsor, […]

Millions of Connected Cameras Open to Eavesdropping on IoT Camera Feeds

IoT Camera

A supply-chain component contains a critical impact vulnerability that allows a remote attacker to eavesdrop on IoT camera feeds. CVE-2021-32934 has a CVSS score of 9.1, it was introduced through ThroughTek, a component that is commonplace in CCTV systems along with other connected camera devices such as baby monitors. ThroughTek’s point-to-point (P2P) software development kit […]

New Kubernetes Malware Backdoors Clusters via Windows Containers

windows containers

A malware strain has been at large for over a year, which was observed to compromise Kubernetes Clusters clearing the way for a backdoor, giving the attacker persistent access. Kubernetes was originally developed by Google and is currently maintained by the Cloud Native Computing Foundation. It is an open-source system that helps automate the deployment, […]

SOC 2 Type 2: How to Prepare for the Audit Webinar

soc 2 type 2

Risk Crew announces part 2 of the SOC-IT-2-ME series, SOC 2 Type 2: How to Prepare for the Audit Webinar. Let us give you an insight into our upcoming webinar. Established by the American Institute of Certified Public Accountants, SOC 2 defines a governance framework for managing sensitive customer information based on 5 Trust Service […]

NoSQL Injection Attacks Expose Rocket Chat Servers to Remote Code Execution

Rocket chat servers

Two vulnerabilities in the Rocket Chat (RC) application make it possible for attackers to achieve remote code execution on the server hosting them. RC is a popular open-source messaging platform for enterprise customers. Customers include Lloyd’s, Lockheed Martin and the University of California. RC utilises the MongoDB database, which uses NoSQL to store its data. […]

Risk Crew