What Is SOC 2 Compliance In Terms Of Technology
Service Organization Control 2, known as SOC 2 for short, compliance in relation to technology has to do with how service organizations manage and secure customer data, in particular when…
Read moreWhat Is SOC 1 In Terms Of Technology?
In terms technology and SOC 1 compliance, it refers to the adherence of a service organization's technology related and control processes to the auditing standards that are defined in the…
Read more2023 Cost Of A Data Breach
The average cost of a data breach in 2021 was sitting at $4.24 million US dollars. In 2022 this increased by 2.6% to $4.35 million US dollars according to data…
Read more2023 Data Breach Statistics By Industry
The average cost of a data breach in 2021 was sitting at $4.24 million US dollars. In 2022 this increased by 2.6% to $4.35 million US dollars according to data…
Read moreMorris Worm In The Early Days Of the Internet Showed The Cyber Security Risks That Existed
In 1988 the internet was a simpler and friendlier place. No more than 100,000 computer were connected to the internet. At this time nobody considered that security measures such as a…
Read moreOkta breached again due to past breaches
Identity management platform Okta, on October 20th 2023, said it had suffered another breach in its customer support system. As a company that deals with access and authentication services, when…
Read moreAlternative to Net User Command when needing user information in a multi-domain setup
I have gotten question if there is a way to see user information that is in AD when there are multiple domains on prem. Normally one would use the net…
Read more2023 Top Data Breach Statistics
The average cost of a data breach in 2021 was sitting at $4.24 million US dollars. In 2022 this increased by 2.6% to $4.35 million US dollars according to data…
Read moreHow Do Data Breaches Occur?
The average cost of a data breach in 2021 was sitting at $4.24 million US dollars. In 2022 this increased by 2.6% to $4.35 million US dollars according to data…
Read moreWhen Should mTLS Be Used & When Should It Not Be Used?
If you are looking to adopt a zero trust security posture, mTLS is a must have when it comes to network communications between various application components that you manage as…
Read more








