FILTER
The Full Scope
Trends, tips, regulations, and all things security
4 Reasons Why You Should Get SOC 2 Now
These 4 reasons sum up why you should get your SOC 2 now: 1) customers will ask for it, 2) it's a competitive...
READ MORE
Security Controls Explained: Access Control
Tugboat Logic's explainer on access control for SOC 2 audits gives you three easy-to-remember pointers and...
READ MORE
The Top 3 Things That Will Delay Your SOC 2
These 3 things will delay your SOC 2: risk assessments, penetration tests, and internal security audits....
READ MORE
SOC 2 and ISO 27001 Risk Assessment
Tugboat Logic's explainer on risk assessments for SOC 2 and ISO 27001 teaches you how to conduct risk...
READ MORE
The 3 Security and Compliance Trends for 2020
Here are the top three security and compliance trends for 2020 Tugboat Logic has gathered from their...
READ MORE
Secure Coding Best Practices
Part 3 of the security best practices guide teaches you how to conduct internal security tests using three...
READ MORE
How to Extend Your Security to Customers
The fourth (and final) part of Tugboat Logic's security best practices guide provides recommendations on...
READ MORE
Operational Security Best Practices for Startups: People, Process and Technology
Part 1 of the security best practices guide teaches you how to foster a blameless security culture, extend...
READ MORE
Assembling Remote Teams, Part 1: Building the Foundation and Scaling
Here's part 1 of Ray Kruck's, Tugboat Logic CEO and Founder, tips on building and leading remote and...
READ MORE
Assembling Remote Teams, Part 2: Performance Management
Here's part 2 of Ray Kruck's, Tugboat Logic CEO and Founder, tips on building and leading remote and...
READ MORE
Application and Infrastructure Security Best Practices
Part 2 of the security best practices guide gives you a basics checklist (e.g. set up HTTPs, keep backups of...
READ MORE
Security Controls, Explained: Third-Party Risk Management for SOC 2 and ISO 27001
Tugboat Logic's explainer on third-party risk management shows why the vendor management security control for...
READ MORE