Despite our best efforts, sometimes things go wrong. The best way to handle situations should they arise, is to have a plan to act in advance, and keep that plan updated when threats change. This not only covers risks to your data by bad actors but plans in the event of a server outage or a natural disaster as a few examples.
Current matches for your
Search Results
Why Did We Get ISO 27001 Certified?
Others Avoid It, We Said “Challenge Accepted” From the beginning, Tugboat Logic’s goal has been to demystify the complexities of information security. While no one enjoys being audited, this inevitability is what fuels us to constantly improve upon our product. So...
Change Management Process: Time to Go Deeper
Your formal Change Management Process will guide you through the planning and implementation of your changes. Documentation and approval need to cover all the changes in terms of software, enhancements, applications and any other systems or elements the changes will involve or touch.
Guide to Penetration Testing for Compliance and Audits
Author: Alexandre Côté, Vumetric Cybersecurity Penetration testing, also known as ethical hacking or pentesting, plays an important role in the compliance process of various standards, including SOC 2, PCI-DSS, and ISO 27001. According to the National Institute of...
Change Management: It Is Inevitable
Change happens whether we like it or not, and that holds true for an organization’s systems and offerings. Keeping track of these changes might be a tedious task, but critical for knowing when changes happened and who made them.
Security Awareness Training: Montage Optional
Creating a plan for Security Awareness Training is only half the battle. Implementing and ensuring that your employees follow that plan regularly is the key to implementing this control. Also, investing in training and security awareness programs is vital for sustainable business growth and success.
Employee Training Plan: Good Plans Go A Long Way
How you train your employees will largely determine their effectiveness and adherence to company policies. While many practices can be common sense and their skills catered specifically to the job they were hired to perform, a training plan can go a long way to ensure that elements of your organization stay safe, secure and run as smoothly as possible.
How 3CLogic Used Tugboat to Get SOC 2 Certified and Shift Security Left
When Global 2000 and Inc 5000 enterprise organizations need the right platform to improve their call centers’ ROI and overall customer experience, they call on 3CLogic.
How Utilant Manages Hundreds of Policies and Controls Across Dozens of Insurance Industry Regulations with Tugboat Logic
Risk is the currency that large P&C insurance carriers deal with day in and day out. And when the risk-takers need to manage their loss control exposures, they turn to Utilant.
Evaluation and Developmental Needs: Maintaining the Momentum
Evaluating and assessing your employees regularly will maintain momentum and ensure they continue to fulfill the requirements of the job.
Best Practices for Managing Access Controls
One of the more important security controls in any organization's security program is access controls, especially when it comes to your infrastructure. But given that most organizations lack both complete visibility into and control of their cloud infrastructure, it's...
Best Practices for Securing Kubernetes, Serverless, and Containers
Kubernetes, containers, and serverless have been part of the "new stack" that everyone talks about, but hasn't quite yet fully harnessed. And, security best practices for these are still being formulated. That's where Lacework's CEO Dan Hubbard is looking to change...