As technological innovation continues to evolve, so do the nature and severity of cybersecurity threats. This makes robust information security controls and risk assessment high priorities for organizations that handle... Read More
Blog
CMMC vs NIST: What’s the Difference?
If your firm is a government contractor working with the U.S. Department of Defense, or works anywhere in the DoD supply chain, brace for big changes in the cybersecurity requirements... Read More
Security Awareness: 5 Ways to Educate Your Employees
When you want to create (or revive) a strong culture of cybersecurity, security awareness training for employees is the best place to start. The challenge is cybersecurity threats evolve constantly,... Read More
Reciprocity and ZenGRC Honored with Industry Accolades for Information Security Risk and Compliance
Recognized in Four Categories by Cybersecurity Excellence Awards Named Grand Trophy Winner in Cyber Security Global Excellence Awards SAN FRANCISCO – March 10, 2021 – Reciprocity, a leader in information... Read More
How to Approach Compliance Documentation for SOC 2
Compliance audits require copious amounts of documentation. A SOC 2 audit for cybersecurity controls is no different. When the auditing team arrives to perform a SOC 2 audit on your... Read More