Change Management Process: Time to Go Deeper

Your formal Change Management Process will guide you through the planning and implementation of your changes. Documentation and approval need to cover all the changes in terms of software, enhancements, applications and any other systems or elements the changes will involve or touch.

Guide to Penetration Testing for SOC 2, PCI, GDPR, and ISO 27001

Author: Alexandre Côté, Vumetric Cybersecurity Penetration testing, also known as ethical hacking or pentesting, plays an important role in the compliance process of various standards, including SOC 2, PCI DSS, and ISO 27001. According to the National Institute of Standards and Technology (NIST), penetration testing can be defined as “a specialized type of assessment conducted Guide to Penetration Testing for SOC 2, PCI, GDPR, and ISO 27001

Change Management: It Is Inevitable

Change happens whether we like it or not, and that holds true for an organization’s systems and offerings. Keeping track of these changes might be a tedious task, but critical for knowing when changes happened and who made them.

Security Awareness Training: Montage Optional

Creating a plan for Security Awareness Training is only half the battle. Implementing and ensuring that your employees follow that plan regularly is the key to implementing this control. Also, investing in training and security awareness programs is vital for sustainable business growth and success.

SOC 2 Compliance Employee Training Plan: Good Plans Go A Long Way

How you train your employees will largely determine their effectiveness and adherence to company policies. While many practices can be common sense and their skills catered specifically to the job they were hired to perform, a training plan can go a long way to ensure that elements of your organization stay safe, secure and run as smoothly as possible.

Introducing the Compliance Calendar and Readiness Project Calendar

Project Management for Audits Is Now Available to All Tugboat Logic Users One of the biggest frustrations about staying compliant is “audit fatigue” – meaning companies feeling like they are always going through some stage of an audit. Whether it is evidence collection, trying to track down documentation, or timely gap remediation, the worry is Introducing the Compliance Calendar and Readiness Project Calendar

Best Practices for Managing Access Controls

One of the more important security controls in any organization’s security program is access controls, especially when it comes to your infrastructure. But given that most organizations lack both complete visibility into and control of their cloud infrastructure, it’s hard for security and operations teams to figure out what actions are being performed by which Best Practices for Managing Access Controls

Video Case Study: How Tugboat is “a Chief Security Officer Practice that Mercatus Can Tap Into On-Demand When Needed”

Learn how “Tugboat presented themselves as a clear offering and a clear differentiator vs. going the traditional route with consulting practices” and why Jason Adams (CTO and Global Head of Product at Mercatus) said Tugboat has “been able to accelerate the time that we need for, not only our initial audits, but ongoing audits and Video Case Study: How Tugboat is “a Chief Security Officer Practice that Mercatus Can Tap Into On-Demand When Needed”

Best Practices for Securing Kubernetes, Serverless, and Containers

Kubernetes, containers, and serverless have been part of the “new stack” that everyone talks about but hasn’t quite yet fully harnessed. And, security best practices for these are still being formulated. That’s where Lacework’s CEO Dan Hubbard is looking to change all of that through Lacework’s end-to-end security and compliance platform for multi-cloud and new Best Practices for Securing Kubernetes, Serverless, and Containers