Management, compliance & auditing

SOC 1 compliance: Everything your organization needs to know

Learn about SOC 1 compliance, how it differs from SOC 2 and SOC 3, and how to prepare for a SOC 1 audit.

Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3

Service providers may need SOC compliance to stay competitive. Learn about the various types of SOC compliance and which to pursue.

How to comply with FCPA regulation – 5 Tips

Check out the top five methods you can use in order to come into compliance with the Foreign Corrupt Practices Act of 1977 (FCPA).

ISO 27001 framework: What it is and how to comply

ISO 27001 is a standards framework that provides best practices for risk-based, systematic and cost-effective information security management.

Why data classification is important for security

Malicious actors want your data, but not all data is created equal. That's why data classification is a crucial step when it comes to data security.

Threat Modeling 101: Getting started with application security threat modeling [2021 update]

Learn the basics of threat modeling and what to use it for.

VLAN network segmentation and security- chapter five [updated 2021]

A deep dive into VLAN security practices.

CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance

Follow the California Consumer Privacy Act and the California Online Privacy Protection Act for data security compliance.

IT auditing and controls – planning the IT audit [updated 2021]

Performing an IT audit is important to understand your security strengths and weaknesses.

Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]

Threat modeling via the STRIDE model can help reduce the effect of security attacks.