Today’s business landscape is fast paced, and ever-changing. If you are always reactive instead of proactive, generally, you are losing. Despite this, there is one fact that never changes: threat-actors…
Read Article
“You cannot endow even the best machine with initiative; the jolliest steamroller will not plant flowers.” Walter Lippmann In 2017 the AICPA announced a new attestation engagement called SOC for…
Read Article
When the topic of the deep or dark web comes up, it is hard not to picture Hollywood’s ‘The Matrix.’ In fact, I specifically picture the scene where Morpheus offers…
Read Article
"The long unmeasured pulse of time moves everything. There is nothing hidden that it cannot bring to light, nothing once known that may not become unknown. Nothing is impossible." -…
Read Article
In today’s business environment, most companies use some sort of outsourced service provider. You may only use a company to print statements; you may have your core application outsourced; or…
Read Article
ISACA recently released results from the annual global State of Cybersecurity Survey conducted last October. A total of 2,366 individuals with a Certified Information Security Manager (CISM) and/or Cybersecurity Nexus…
Read Article