FILTER

The Full Scope

Trends, tips, regulations, and all things security

Background Checks: Super Sleuthing for Your Security

Control of the Week #8: Background and Reference Checks This week’s control is on background and reference...
READ MORE

How to Pick an Auditor for SOC 2 and Beyond

Straightforward, non-salesy advice on how to choose auditors for security certifications like SOC 2 is...
READ MORE

How to Make Your Passwords Pass Audits

Control of the Week #7: Password Control This week’s control is on passwords. Jose Costa (CISO at Tugboat...
READ MORE

Security Controls, Explained: Admin Access

Control of the Week #6: Administrative Access This week’s control is on risk assessments. Jose Costa (CISO...
READ MORE

IT Employee Offboarding Checklist

Employee offboarding is difficulty time. Along with the implications to emotions and morale, you’ll...
READ MORE
security employee monitoring user access review

How to Conduct User Access Review

User Access Review This week’s control is on user access review. Jose Costa (CISO at Tugboat Logic) and...
READ MORE

4 Reasons Why You Should Get SOC 2 Now

These 4 reasons sum up why you should get your SOC 2 now: 1) customers will ask for it, 2) it's a competitive...
READ MORE
access control

Security Controls Explained: Access Control

Tugboat Logic's explainer on access control for SOC 2 audits gives you three easy-to-remember pointers and...
READ MORE
delay soc 2

The Top 3 Things That Will Delay Your SOC 2

These 3 things will delay your SOC 2: risk assessments, penetration tests, and internal security audits....
READ MORE

SOC 2 and ISO 27001 Risk Assessment

Tugboat Logic's explainer on risk assessments for SOC 2 and ISO 27001 teaches you how to conduct risk...
READ MORE

The 3 Security and Compliance Trends for 2020

Here are the top three security and compliance trends for 2020 Tugboat Logic has gathered from their...
READ MORE
Hero - Secure Coding Best Practices

Secure Coding Best Practices

Part 3 of the security best practices guide teaches you how to conduct internal security tests using three...
READ MORE