FILTER

compliance

What is SOC 2? Everything You Need to Know.

In today’s market, SOC 2 has become table steaks. It’s necessary to provide security assurance to...
READ MORE

HIPAA vs ISO 27001: What’s the Difference?

What’s the difference between HIPAA and ISO 27001? We know that comparing infosec acronyms seems like...
READ MORE
SOC 2 vs HIPAA Compliance: What’s the Difference?

SOC 2 vs HIPAA Compliance: What’s the Difference?

Everyone feels the pressure to level up their data security game but what’s the difference between SOC...
READ MORE

How Long Does ISO 27001 Take?

If you’re considering becoming ISO 27001 certified, one of the first questions to pop into your mind...
READ MORE
SOC 2 compliance checklist

The Best SOC 2 Compliance Checklist: What We Learned Passing SOC 2 Type 2

We learned so much passing SOC 2 Type 2 that we compiled it into the best SOC 2 compliance checklist! SOC 2...
READ MORE
Federal agency frameworks

A Beginners Guide to Today’s Top Federal Agency Frameworks

We put together a beginner’s guide to today’s top federal agency frameworks to help you avoid...
READ MORE

Secrets to Selecting the Right SOC 2 Vendor

In this article, we condense unbiased, expert research from Fractional CISO highlighting: Three core SOC 2...
READ MORE

ISO 27001 Bootcamp Part 2: Understanding Annex A Controls

Welcome to the second installment of Tugboat Logic’s ISO 27001 Bootcamp series. In part 1, we covered...
READ MORE
ISO 27001 Bootcamp: Part 1 Hero

ISO 27001 Bootcamp Part 1: Scoping and Mandatory Clauses

Today, we’re kicking off installment number one of the highly anticipated ISO 27001 Bootcamp, where...
READ MORE

The Top 5 Security Questions Your Board Is Likely to Ask

Cyber risk is rising, prompting the board and senior leadership to ask more questions about cybersecurity....
READ MORE

Top 3 Things Every InfoSec Program Should Have

Establishing an InfoSec program enables your organization to build trust quickly so you can sell more....
READ MORE

Employees and Cyberthreats: To Err Is Human and Costly

It’s a common misconception that threat actors, individuals behind online attacks, live outside an...
READ MORE