Difference between SOC 2 Type 1 and Type 2

Difference between SOC 2 Type 1 and Type 2

Blog  Difference between SOC 2 Type 1 and Type 2 Difference between SOC 2 Type 1 and Type 2 When it comes to keeping your organization’s data secure and compliant, understanding SOC reports is a must. SOC 1 and SOC 2 might sound like technical jargon, but they’re...
SOC 1 Type 1 vs Type 2

SOC 1 Type 1 vs Type 2

Blog  SOC 1 Type 1 vs Type 2 SOC 1 Type 1 vs Type 2 Deciphering the complex world offinancial reporting can be daunting, especially when understanding SOC 1 Type 1and Type 2 reports. In this article, we aim to simplify these terms and helpyou discern which report...
SOC 2 Type 1 Compliance

SOC 2 Type 1 Compliance

Blog  SOC 2 Type 1 Compliance SOC 2 Type 1 Compliance   In this era of digital technology and services, clients want to be certain that their personal data remains safe. Businesses that fail safeguard client data, results in clients losing their trust and...
PCI DSS version 3.2.1 replaces version 3.2

PCI DSS version 3.2.1 replaces version 3.2

Today the PCI Security Standards Council published a minor revision to the PCI Data Security Standard (PCI DSS). PCI DSS version 3.2.1 replaces version 3.2 to account for effective dates and Secure Socket Layer (SSL)/early Transport Layer Security (TLS) migration...
10 Habits of Great CISO’s

10 Habits of Great CISO’s

I’ve had the good fortune to collaborate and work with many truly great CISO’s. Here are some observations of the personal habits that make them great and the attributes that anyone in Cybersecurity can emulate. They make time. No one in IT security has enough...
The FUD Factor

The FUD Factor

Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in selling security. FUD is an acronym for Fear, Uncertainty and Doubt. The topic focused on CISO’s “selling” security to the...
Are you failing Security Basics 101?

Are you failing Security Basics 101?

Patching, backups, firewall configuration … when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools. Read the...