What is TISAX Assessment Level 2.5 (AL 2.5)?
by CJ Hurd on January 8, 2025 at 2:21 PM
In the realm of automotive and industrial information security, TISAX (Trusted Information Security Assessment Exchange) plays a vital role in standardizing security assessments among partners and suppliers. One of its unique features is the concept of assessment levels, which determi …
Essential Elements of an Effective Virtual CISO (vCISO) Program
by CJ Hurd on October 30, 2024 at 4:32 PM
In today's digital world, organizations face more cyber threats than ever before. With attacks becoming increasingly complex and frequent, businesses need strong cybersecurity leadership to stay ahead. That's where a Virtual Chief Information Security Officer (vCISO) comes in—a smart …
Nobody Is Exempt from Vendor Security Questionnaires
by CJ Hurd on July 12, 2024 at 12:00 PM
Increased supply chain and vendor breaches have underscored the critical importance of vendor security questionnaires for safeguarding organizational security. These questionnaires have emerged as essential tools for organizations to evaluate the security practices of their third-part …
How Data Classification Can Combat Data Sprawl & Enhance Efficiency
by CJ Hurd on June 4, 2024 at 11:00 AM
Data sprawl is a pervasive issue in modern organizations, characterized by the uncontrolled and often chaotic growth of data across various systems and storage solutions. As businesses accumulate vast amounts of data, the challenges of managing, securing, and utilizing this informatio …
How Much Does a SOC 2 Audit Cost?
by CJ Hurd on May 7, 2024 at 1:15 PM
Navigating the financial intricacies of a SOC 2 audit requires precise planning and a deep understanding of the factors that influence its cost. From the size and complexity of your organization to the scope and depth of the audit itself, multiple elements can affect the financial res …
vCISO vs. CISO: What's the Difference?
by CJ Hurd on January 11, 2024 at 11:19 AM
The changing nature of security has resulted in the rise and development of important positions focused on protecting sensitive data. Alongside the role of the Chief Information Security Officer (CISO) a newer role has emerged; the Virtual CISO (vCISO). Although both roles aim to impr …