As COVID-19 continues to spread worldwide, not only disrupting health and life but also business continuity up and down the supply chain, economic and cyber risk have taken on pandemic... Read More
Blog
The Difference Between Vulnerability Assessment and Vulnerability Management
In today's constantly evolving cybersecurity threat landscape, you have to do everything possible and then some to protect your critical data assets. Performing a vulnerability assessment and implementing a vulnerability... Read More
What Compliance Lessons Can We Learn From Past Pandemics?
COVID-19 has us reeling from health, social, and economic shocks, but this isn’t our first global crisis. It is, however, the first in which cybercrime plays a starring role. The... Read More
What is a Third Party Under CCPA?
The California Consumer Privacy Act (CCPA), which went into effect January 1, 2020, took a different approach to how it defines a third party. The privacy law doesn't indicate what... Read More
FCPA compliance checklist
An FCPA compliance program checklist outlines the things an American company needs to check when it wants to do business in a foreign country to ensure it follows the guidelines... Read More