Strict-Transport-Security: max-age=31536000; includeSubDomains; preload Content-Security-Policy-Report-Only: frame-ancestors 'self' https://*.travasecurity.com; script-src 'self'; style-src 'self'; img-src 'self' https:; default-src https: report-uri https://report.centralcsp.com/68f8eb863bf8b7a78b67ab9e; report-to csp-endpoint; Reporting-Endpoints: csp-endpoint="https://report.centralcsp.com/68f8eb863bf8b7a78b67ab9e" Google Tag:
You Bought a Compliance Automation Tool… Now What?

You Bought a Compliance Automation Tool… Now What?

Your compliance tools and automation say you’re in the clear. Everything’s marked complete, deadlines are met, and the compliance dashboard is all green. But when it’s time for the audit, you’re still unprepared. In this episode, Kaitlin Zanoni, Security Advisor...
Introducing Season 5 of The Tea on Cybersecurity

Introducing Season 5 of The Tea on Cybersecurity

Cybersecurity can feel overwhelming with its many acronyms, shifting rules, and conflicting advice. That’s why Season 5 of The Tea on Cybersecurity is all about separating fact from fiction. Host Jara Rowe kicks things off by identifying the common questions business...
Key Lessons from Season 4 of The Tea on Cybersecurity

Key Lessons from Season 4 of The Tea on Cybersecurity

If there’s one key takeaway from Season 4 of The Tea on Cybersecurity, it’s that cybersecurity is a shared responsibility. With this in mind, host Jara Rowe wraps up the season by sharing valuable insights that everyone can use. She reflects on the most impactful...