FILTER
The Full Scope
Trends, tips, regulations, and all things security
Change Management Process: Time to Go Deeper
Your formal Change Management Process will guide you through the planning and implementation of your changes....
READ MORE
Guide to Penetration Testing for SOC 2, PCI, GDPR, and ISO 27001
Author: Alexandre Côté, Vumetric Cybersecurity Penetration testing, also known as ethical hacking or...
READ MORE
Change Management: It Is Inevitable
Change happens whether we like it or not, and that holds true for an organization’s systems and offerings....
READ MORE
Security Awareness Training: Montage Optional
Creating a plan for Security Awareness Training is only half the battle. Implementing and ensuring that your...
READ MORE
SOC 2 Compliance Employee Training Plan: Good Plans Go A Long Way
How you train your employees will largely determine their effectiveness and adherence to company policies....
READ MORE
How 3CLogic Used Tugboat to Get SOC 2 Certified and Shift Security Left
When Global 2000 and Inc 5000 enterprise organizations need the right platform to improve their call...
READ MORE
How Utilant Manages Hundreds of Policies and Controls Across Dozens of Insurance Industry Regulations with Tugboat Logic
Risk is the currency that large P&C insurance carriers deal with day in and day out. And when the risk-takers...
READ MORE
Evaluation and Developmental Needs: Maintaining the Momentum
Evaluating and assessing your employees regularly will maintain momentum and ensure they continue to fulfill...
READ MORE
Introducing the Compliance Calendar and Readiness Project Calendar
Project Management for Audits Is Now Available to All Tugboat Logic Users One of the biggest frustrations...
READ MORE
Best Practices for Managing Access Controls
One of the more important security controls in any organization’s security program is access controls,...
READ MORE
Video Case Study: How Tugboat is “a Chief Security Officer Practice that Mercatus Can Tap Into On-Demand When Needed”
Learn how “Tugboat presented themselves as a clear offering and a clear differentiator vs. going the...
READ MORE
Best Practices for Securing Kubernetes, Serverless, and Containers
Kubernetes, containers, and serverless have been part of the “new stack” that everyone talks...
READ MORE