Cyabra Launches Deepfake Detection

Cyabra Achieves SOC 2 Compliance

SOC 2 is a voluntary compliance standard for technology companies with cloud-based products, which specifies how an organization should manage customer data. The compliance guidelines set by the AICPA (American Institute of Certified Public Accountants) ensure services are secure, available, and confidential and that information security best practices are in place.

Multiple tests were performed to ensure that Cyabra’s internal controls are implemented and operating effectively, which includes infrastructure, software, processes, people, and data, relating to:

  • Remote onboarding of employees
  • Cloud infrastructure security
  • Risk management
  • Multi-factor authentication
  • User access review
  • Threat detection
  • Change management procedures
  • Assets management
  • Data encryption
  • Secure development and more

Cyabra’s solution was built around being SOC 2 compliant, and now our concrete data protection practices have been officially recognized.

What Being SOC 2 Compliant Means for Cyabra’s Clients

Achieving SOC 2 compliance means that Cyabra has implemented controls and procedures to protect your data and ensure the reliability of our services. We follow strict security standards to protect our clients’ data from breaches, leaks, and unauthorized access, and continuously monitor, test, and improve our security so that your data is always protected.

What’s Next for Cyabra’s Compliance

SOC 2 compliance is an ongoing project, not a one-time milestone. As part of Cyabra’s dedication to maintaining the highest security standards, we will renew our SOC 2 report on an annual basis and continue to deliver real, ongoing security that protects our clients every step of the way.

____________

In becoming SOC2 compliant, Cyabra utilized the assistance of Scytale. Scytale helped navigate the finer details of the SOC 2 framework, getting Cyabra’s internal processes audit-ready, and bringing the expertise, structure, and hands-on support to make this journey successful.

Related posts

Unveiling Online Threats to Individuals

High-profile individuals in important roles across companies and organizations are frequently subject to risks emerging from the online world. You don’t have to be Elon...

Rotem Baruchin

January 8, 2024

Journalists, Watch Out for Impersonators

Did you hear about the Ticketmaster customer care impersonation? What about the 165 fake profiles impersonating Bank Negara? Other major companies like American Express and...

Confused people reacting to duplicate live journalist profiles emerging from a laptop displaying the Twitter logo, symbolizing social media impersonation

Rotem Baruchin

June 27, 2023

How Foreign State Actors Threaten Democracies

Yossef Daar, Cyabra's co-founder and CPO, reveals how state actors like Russia, China, and Iran use AI-driven disinformation to manipulate public opinion and target democracies,...

Hooded silhouettes on a digital grid in front of a glowing world map with floating social media icons, representing covert foreign influence on global online platforms

Yossef Daar

March 3, 2025