Information Security and Data Privacy Practices

As a leading SaaS Customer Identity & Access Management provider for enterprises, Gigya is committed to maintaining only the highest level of performance and security. Our platform is optimized to deliver maximum efficiency and scalability while protecting your data with a series of strict security and compliance standards.

Spotlight

Exodus Intelligence

Exodus Intelligence provides actionable security information through a vulnerability intelligence data feed. This data feed consists of detailed analysis of zero-day vulnerabilities, their relative risk, proprietary vulnerability research, and recommendations for mitigation. By leveraging the expertise and insight of a highly experienced research team, in conjunction with insight derived from an external vulnerability research acquisition program, the Exodus Intelligence feed delivers up-to-date, accurate, and relevant security information, enabling its customers to make informed decisions to strengthen their security posture.

OTHER WHITEPAPERS
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More

Spotlight

Exodus Intelligence

Exodus Intelligence provides actionable security information through a vulnerability intelligence data feed. This data feed consists of detailed analysis of zero-day vulnerabilities, their relative risk, proprietary vulnerability research, and recommendations for mitigation. By leveraging the expertise and insight of a highly experienced research team, in conjunction with insight derived from an external vulnerability research acquisition program, the Exodus Intelligence feed delivers up-to-date, accurate, and relevant security information, enabling its customers to make informed decisions to strengthen their security posture.

Events