FILTER

Certifications

Backup and Recovery Process: Choose It or Lose It

Despite our best efforts, sometimes things go wrong. The best way to handle situations should they arise, is...
READ MORE

Why Did We Get ISO 27001 Certified?

Others Avoid It, We Said “Challenge Accepted” From the beginning, Tugboat Logic’s goal has been to...
READ MORE

Change Management Process: Time to Go Deeper

Your formal Change Management Process will guide you through the planning and implementation of your changes....
READ MORE

Guide to Penetration Testing for SOC 2, PCI, GDPR, and ISO 27001

Author: Alexandre Côté, Vumetric Cybersecurity Penetration testing, also known as ethical hacking or...
READ MORE
hero - Change Management Process

Change Management: It Is Inevitable

Change happens whether we like it or not, and that holds true for an organization’s systems and offerings....
READ MORE
hero - Security Awareness Training

Security Awareness Training: Montage Optional

Creating a plan for Security Awareness Training is only half the battle. Implementing and ensuring that your...
READ MORE
hero- Employee Training Plan

SOC 2 Compliance Employee Training Plan: Good Plans Go A Long Way

How you train your employees will largely determine their effectiveness and adherence to company policies....
READ MORE

How Utilant Manages Hundreds of Policies and Controls Across Dozens of Insurance Industry Regulations with Tugboat Logic

Risk is the currency that large P&C insurance carriers deal with day in and day out. And when the risk-takers...
READ MORE

How 3CLogic Used Tugboat to Get SOC 2 Certified and Shift Security Left

When Global 2000 and Inc 5000 enterprise organizations need the right platform to improve their call...
READ MORE

Evaluation and Developmental Needs: Maintaining the Momentum

Evaluating and assessing your employees regularly will maintain momentum and ensure they continue to fulfill...
READ MORE

Best Practices for Managing Access Controls

One of the more important security controls in any organization’s security program is access controls,...
READ MORE

Best Practices for Securing Kubernetes, Serverless, and Containers

Kubernetes, containers, and serverless have been part of the “new stack” that everyone talks...
READ MORE