by Rob Burton | Aug 31, 2023
In the ever-changing digital world, complying with SOC 2 requirements is necessary for businesses to protect their systems’ security, availability, processing integrity, confidentiality, and privacy. Tabletop exercises have emerged as a critical method to...
by Mark Hoffman | May 21, 2019
What Two Questions Do You Need to be Prepared to Answer After a Cyberattack? In this day and age, it’s prudent to think of a cyberattack as a “when”, not “if” scenario. The truth is, your network is under attack right now and the tools and techniques utilized...