Human Root of Trust
14th January 2021
The Human Root of Trust is composed of the key pieces that allow someone to confidently identify a human on the Internet.
-- READ MORE
SOC 2 Compliance is Cybersecurity Customized, not Prescribed.
3rd December 2020
Does this sound familiar to you? The Sales team at your company keeps getting pushback from potential customers, particularly the larger ones. They insist on asking lots of invasive pre-sales questions about your company’s security practices, and it’s bogging down the process and you’re losing deals. The Director of Sales notices that many of the…
-- READ MORE
Free Cybersecurity Training: Good, but not Great.
24th November 2020
An employee at a company gets an email that looks like it’s from their boss, asking them to open a link or download an attachment for a project. The employee performs the task as requested, only to later discover their account was compromised! This employee was the victim of a social engineering phishing attack, where…
-- READ MORE
Three Keys to a Great Internal Audit
19th November 2020
I don’t remember much about middle school. It was the 80s, though, and things were certainly different back then. We had real chalk boards (with erasers that needed periodic clapping), gender-separated gym classes, and junk food and soda in the vending machines. One memory, in particular, has stayed with me. It happened in science class…
-- READ MORE