FILTER
InfoSec Best Practices
Accelerate Revenue With These 5 Security Must-Haves
This article recaps CEO Ray Kruck’s live workshop of the same name at SaaStr Annual 2021. Many executives...
READ MORE
Employees and Cyberthreats: To Err Is Human and Costly
It’s a common misconception that threat actors, individuals behind online attacks, live outside an...
READ MORE
SOC 2 Bootcamp Part 4: The Audit
Welcome to part four of SOC 2 Bootcamp, covering everything involved in the audit process, including...
READ MORE
The Importance of a PCI DSS Self-Assessment Questionnaire
You’re a busy and important person, with many plates to spin and deals to win. I get that!...
READ MORE
Tips and Tricks for Enterprise IT Risk Assessments
Did you know that 76% of enterprises lack a clearly defined enterprise IT risk assessment and management...
READ MORE
How to Perform a Vendor Risk Assessment
Knowing who your vendors are, how they manage their risks and the impact it could have on your company is a...
READ MORE
The Basics of a Risk Treatment Plan
A risk treatment plan (RTP) is an essential part of an organization’s InfoSec program. In fact, ISO...
READ MORE
SOC 2 Cost Guide
The SOC 2 cost guide has been our most popular download every month since it was first released. It’s...
READ MORE
The Basics of GDPR Compliance
Boiling the GDPR down to basics sounds too good to be true, but we did it. Doesn’t 2018 seem like a...
READ MORE
Tugboat Logic Essentials: The Security Foundation for Startups
A Strong Security Foundation Starts With a Smart InfoSec Program One of the first stages of security maturity...
READ MORE
How to Prevent a Data Breach
Every company should understand how to prevent a data breach because they’re happening all the time,...
READ MORE
What Is NIST 853?
InfoSec, SOC 2, ISO 27001, NIST 853—when it comes to technology standards and compliance, there are so many...
READ MORE