The Role of MS(S)Ps in Successful Audits

The Role of MS(S)Ps in Successful Audits

This article was authored by Apptega, provider of tools to simplify cybersecurity management and compliance. The word “audit” conjures dread for the never-ending questions, paperwork, and pressure it implies. Organizations that partner with security-focused IT...
Handling High-Stakes Data Security Audits

Handling High-Stakes Data Security Audits

  Audit. It’s a word that if not scares, at the very least, makes IT Management, the Security team, and Executives uncomfortable. When you’re doing everything you can to keep things running, the last thing you want is to have someone come in and tell you you’re...
Webinar: Navigating High-Stakes Audits

Webinar: Navigating High-Stakes Audits

Art Provost, VP of Security Services at Filament Essential Services and a 30-year security veteran with deep experience as both the auditor and auditee, shares best practices for streamlining the collection and presentation of evidence, articulating compliance with...
Protip: 7 Ways to Identify Phishing Emails

Protip: 7 Ways to Identify Phishing Emails

Are you sure that convincing email you just received from Southwest Airlines is really from Southwest Airlines? Companies and individuals are often targeted by cybercriminals using emails crafted to look like they are from a legitimate organization or financial...