Thought Leadership
Staying ahead of the curve on changing trends in IT
Our blog is written by our team and covers various subjects in compliance, cybersecurity and business technology.
What’s the difference between SOC 2 Type I and II?
Demystifying the types of SOC 2 Reports If you’re reading this, chances are you’ve been asked by a…
5 Ways to Secure Zoom for Business
Home WiFi Devices Roundup
Advice on what to buy to get your home office WiFi working great
CCPA Updates: Dec 2019
As I’ve blogged about before, the California Consumer Privacy Act (CCPA) will significantly change the landscape for tech companies who…
Featured
Home WiFi Devices Roundup
Advice on what to buy to get your home office WiFi working great
CCPA Updates: Dec 2019
As I’ve blogged about before, the California Consumer Privacy Act (CCPA) will significantly change the landscape for tech companies who…
GDPR Map: May 2019
A quick reference guide as to where the GDPR is law
Are Bug Bounty Programs worth it?
Recent research from MIT quantifies bug bounty effectiveness
What’s the difference between SOC 2 Type I and II?
Demystifying the types of SOC 2 Reports If you’re reading this, chances are you’ve been asked by a…
5 Ways to Secure Zoom for Business
Home WiFi Devices Roundup
Advice on what to buy to get your home office WiFi working great
CCPA Updates: Dec 2019
As I’ve blogged about before, the California Consumer Privacy Act (CCPA) will significantly change the landscape for tech companies who…