FILTER

The Full Scope

Trends, tips, regulations, and all things security

Tugboat Logic to Join Forces With OneTrust

Our mission has always been to make security and compliance accessible—especially to startups who might...
READ MORE

Employees and Cyberthreats: To Err Is Human and Costly

It’s a common misconception that threat actors, individuals behind online attacks, live outside an...
READ MORE
Risk Dashboard

Monitor Your Risks in Tugboat Logic

Risk is one of the most important components of your InfoSec program. Most companies complete their first...
READ MORE
SOC 2 Bootcamp 4 The Audit

SOC 2 Bootcamp Part 4: The Audit

Welcome to part four of SOC 2 Bootcamp, covering everything involved in the audit process, including...
READ MORE

SOC 2 Bootcamp Part 3: Evidence Collection

Welcome to part three of SOC 2 Bootcamp, covering everything involved in evidence collection! Quick Bootcamp...
READ MORE
nist vs iso

NIST vs ISO Compliance: What’s the Difference?

There are hundreds of complex laws and regulations worldwide that organizations find themselves required to...
READ MORE
California Consumer Privacy Act

The Basics of CCPA

California is the birthplace of skateboards, Barbie dolls, arcade games, McDonald’s, the internet, and...
READ MORE
PCI DSS Self Assessment

The Importance of a PCI DSS Self-Assessment Questionnaire

You’re a busy and important person, with many plates to spin and deals to win. I get that!...
READ MORE
enterprise IT risk assessment

Tips and Tricks for Enterprise IT Risk Assessments

Did you know that 76% of enterprises lack a clearly defined enterprise IT risk assessment and management...
READ MORE
SOC 2 Bootcamp Part 2: Policies and Controls

SOC 2 Bootcamp Part 2: Policies and Controls

Welcome to part two of SOC 2 Bootcamp coving policies and controls! Quick refresher—we borrowed Bluth...
READ MORE
How To Perform A Vendor Risk Assessment

How to Perform a Vendor Risk Assessment

Knowing who your vendors are, how they manage their risks and the impact it could have on your company is a...
READ MORE
Introducing the CMMC Framework

Introducing the CMMC Framework

Last year, to protect Controlled Unclassified Information and Federal Contract Information, the US Department...
READ MORE