Internal Audit and IT: Joining the Same Cybersecurity Team

Internal Audit and IT: Joining the Same Cybersecurity Team

| | auditing, HIPAA, ISO27001, PCI, SOC 2
Effective cybersecurity management requires cross-collaboration between multiple stakeholders, and becomes increasingly complex with larger organizations. Though technology can serve as a solution to mitigate security risk, oftentimes the solution requires personnel or ...
You Need To Know How Cybersecurity Affects Mergers and Acquisitions

You Need To Know How Cybersecurity Affects Mergers and Acquisitions

Time to Learn More Anytime you plan to get involved with something, whether it be a person, place, or thing, you need information —sometimes a lot of information. In the world of ...
SOC 2 Audit Explained For SaaS Companies

SOC 2 Audit Explained For SaaS Companies

| | auditing, SaaS, SOC 2, SOC 2 Compliance
Overview As leaders in the SaaS industry, our ongoing success relies on security and the ability to provide clients with certain reassurances about our operational policies, including privacy, availability—and most importantly, cybersecurity ...

Clarifying the Misconceptions: Monitoring and Auditing for Container Security

An effective container security strategy consists of many parts. Organizations should first secure the build environment using secure code control along with build tools and controllers. Next, they should secure the contents ...

On Financial Fraud

There are some good lessons in this article on financial fraud: That's how we got it so wrong. We were looking for incidental breaches of technical regulations, not systematic crime. And the ...

Securing Elections

Elections serve two purposes. The first, and obvious, purpose is to accurately choose the winner. But the second is equally important: to convince the loser. To the extent that an election system ...