Most of you are familiar with the roles and profiles method of writing and classifying Puppet code. However, the roles and profiles method doesn’t have to exist only in your control repository. In fact, as I’ve been developing Puppet code centered around compliance, I’ve found that adapting the roles and profiles method into a design pattern to Puppet modules makes the code more auditable, reusable, and maintainable!
Today, Calligo announces the acquisition of Decisive Data, a pioneer in data analytics, data science and visualization. This is a significant acquisition for Calligo as it not only increases the resources and capabilities of our Data Insights team, but it also creates the most capable, accessible and compliant data insights service for modern businesses.
The first two posts in our compliance blog series focused on managing compliance through automation. In this third post, we take a step back to explore a more foundational — but no less important — topic: What’s the difference between compliance and security? Is compliant infrastructure secure infrastructure? People often talk about compliance and security as though they’re one and the same.
Our IT managed services team talks to dozens of new businesses every month, and they have noticed a new trend emerging. Over the last six months or so, more and more businesses are – without prompt – enquiring about our ability to keep their data safe. This is subtly and importantly different from our ability to provide managed security services. Or to protect their data from internal and external threats.
2021 is off to a stellar start for Calligo. At the Digital Jersey Tech Awards 2020 virtual awards evening, Calligo was announced as the Digital Growth Business of the Year for its achievements throughout last year, while Julian Box was named the Digital Leader of the Year. Calligo was named Digital Growth Business of the Year because of its growth in five key areas: UK expansion A fourth acquisition was also completed in 2020, this time in the UK.
GDPR enforcement (and therefore fines) has been on the rise recently. And after the initial “compliance on paper” that many consultants offered, it’s time to address the cybersecurity aspects underlying GDPR. We have previously addressed the logging requirements of GDPR and now we are going to review the “why” in addition to the “what”.
Why is SIEM Important for Regulatory Compliance? A security information and event management (SIEM) system can improve the security of your business’ computer network with real-time automation, monitoring, logging and event alerts. By leveraging SIEM Software, your security team is able to track events concerning your company’s information security, such as potential data breaches, helping you to react in a timely manner.