SOC2 Type 2 Compliance Through the Cynefin Lens

Tweet Achieving and maintaining SOC2 Type 2 compliance is crucial for organizations handling sensitive data. This post explores the intersection of SOC2 Type 2 controls and the Cynefin framework, offering a unique perspective on navigating the complexities of compliance. The … Continue reading

Use Cases for AI in Vendor Risk Management

Tweet Today, managing vendor relationships has never been more critical. With increasing reliance on third-party vendors, organizations face heightened risks that can affect their operations and reputation. Vendor risk management (VRM) ensures that companies can identify, assess, and mitigate risks … Continue reading

Preparing Your Infosec Program for Quantum Computing

Tweet   Imagine a world where encryption, the bedrock of our current cybersecurity measures, can be unraveled in mere moments. This reality is not just conceivable; it’s on the horizon with the advent of quantum computing. A groundbreaking leap from … Continue reading

Comparing 2 Models for DMZ Implementations

Tweet I recently had a discussion with another technician about the security of the two most popular DMZ implementation models. That is:  The “3 Legged Model” or “single firewall” – where the DMZ segment(s) are connected via a dedicated interface … Continue reading