By:
Gabriel Rivera
December 4th, 2024
Among the several offerings the Sektor7 Institute has related to evasion, privilege escalation, malware development, and persistence, cyber security professionals of various disciplines, from red team operators to incident responders- can all find something of value in Sektor7 Institute’s RED TEAM Operator: Windows Evasion Course.
By:
Schellman
December 3rd, 2024
Consider this—you’re going on an epic trip to Peru to see Machu Picchu. You have plans for incredible food, hikes, and photos, and then someone offers an extra ziplining excursion while you’re in the country. You’ve already paid so much for what will already be an amazing trip, so do you really need to make the extra investment?
By:
Jack Nguyen
November 21st, 2024
It’s no secret that ISO 27001 has become one of the most popular compliance initiatives globally for organizations wishing to prove the solidity of their information security. And though many have already reaped the benefits, some may not have, and others may want to take further advantage of ISO’s stellar reputation regarding their provided frameworks and stack more certifications. Among your options is ISO 22301—another international standard focused on business continuity management.
By:
TERRY O'BRIEN
November 19th, 2024
When planning for a SOC examination, there are several decisions that the service organization undergoing the evaluation must make in order to ensure their needs—as well as those of their customers—are met, be it deciding which vendors are subservice organizations, treatment of subservice organizations (carve-out vs. inclusive), or which type of report you need. Another key decision you must make is determining your SOC reporting period, and there are a few factors to consider before you do so.
By:
Tyler Petersen
November 15th, 2024
Out of all the types of penetration testing we perform at Schellman, physical security is frequently overlooked due to the fact many compliance frameworks simply don’t mandate this type of testing. Of course protecting your physical infrastructure can be challenging. Many organizations struggle to identify and address vulnerabilities, leaving them vulnerable to theft, vandalism, and other threats. The good news is, you're already taking the right steps! By reading this, you're demonstrating a commitment to physical security.
Cybersecurity Assessments | Federal Assessments
By:
Jeff Schiess
November 14th, 2024
In today’s ever-evolving cyber threat landscape, maintaining robust cybersecurity isn’t just a regulatory requirement—it’s a business imperative, and there are multiple avenues organizations can take to do so.
Cybersecurity Assessments | Artificial Intelligence
By:
AVANI DESAI
November 13th, 2024
Even as AI systems become more advanced and enmeshed in daily operations, concerns regarding whether large language models (LLMs) are generating accurate and true information remain paramount throughout the business landscape. Unfortunately, the potential for AI to generate false or misleading information—often referred to as AI “hallucinations”—is very real, and though the possibility poses some significant cybersecurity challenges, there are ways organizations deploying this technology can mitigate the risks.
By:
Schellman
November 12th, 2024
TAMPA, Fla. – November 12, 2024 – Schellman Compliance, a leading provider of compliance services, is pleased to announce the successful acquisition of Sustas, LLC practice, a firm specializing in sustainability reporting services. As part of the transaction, Sustas’s clients and personnel will join Schellman, further strengthening the firm’s ability to deliver tailored, industry-leading sustainability compliance, consulting, and assurance solutions.