Services
Services
SOC & Attestations
SOC & Attestations
Payment Card Assessments
Payment Card Assessments
ISO Certifications
ISO Certifications
Privacy Assessments
Privacy Assessments
Federal Assessments
Federal Assessments
Healthcare Assessments
Healthcare Assessments
Penetration Testing
Penetration Testing
Cybersecurity Assessments
Cybersecurity Assessments
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
ESG & Sustainability
ESG & Sustainability
AI Services
AI Services
Industry Solutions
Industry Solutions
Cloud Computing & Data Centers
Cloud Computing & Data Centers
Financial Services & Fintech
Financial Services & Fintech
Healthcare
Healthcare
Payment Card Processing
Payment Card Processing
US Government
US Government
Higher Education & Research Laboratories
Higher Education & Research Laboratories
About Us
About Us
Leadership Team
Leadership Team
Careers
Careers
Corporate Social Responsibility
Corporate Social Responsibility
Strategic Partnerships
Strategic Partnerships

The Schellman Blog

Stay up to date with the latest compliance news from the Schellman blog.

Blog Feature

Cybersecurity Assessments

By: Joseph Choi
August 1st, 2023

For anyone who wants to expand their skills on red teaming with advanced OPSEC tactics and defense bypass techniques, Red Team Ops II (RTO II) is a great course among the many different exams and certifications a cybersecurity professional might invest in to advance their knowledge—and their careers.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Austin Bentley
July 20th, 2023

As cybersecurity practices go, you have a lot of options, with penetration testing being just one of them. However, a penetration test has more value than many may initially recognize—in addition to how they serve your compliance initiatives.

Blog Feature

Cybersecurity Assessments

By: MATT WILGUS
June 22nd, 2023

When making a business acquisition, the potential of a security risk derailing a deal during an acquisition is quite low. Of course, when firms look to expand the number and types of services they deliver, the first consideration doesn’t usually regard security—instead, you must decide whether to build it or whether to buy it.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: MATT WILGUS
June 16th, 2023

Some might say a good decision is based on knowledge and not on numbers.

Blog Feature

Cybersecurity Assessments | Payment Card Assessments

By: JOE O'DONNELL
May 16th, 2023

One of the latest intriguing developments in the field of artificial intelligence (AI) is ChatGPT—a natural language chatbot that answers questions submitted by a human user. It’s taken off in such a way that many are using ChatGPT to assist in streamlining their writing needs, but how helpful is the bot, really?

Blog Feature

Cybersecurity Assessments

By: Sully Perella
April 18th, 2023

In the legendary Lord of the Rings series, leaders from different societies create a fellowship of nine different people tasked with saving Middle-Earth. The idea wasn’t originally to send nine, and there were obvious reservations about trusting some of the Fellowship with such a serious mission. (Looking at you, Pippin.)

Blog Feature

Cybersecurity Assessments

By: COLLIN VARNER
March 21st, 2023

Throughout history, warfare has evolved. The Romans did it one way, the Vikings did it another—Sun Tzu, Richard the Lionheart, and the Allied forces all had different tactics that forced opponents to adjust their defenses and strategies.

Blog Feature

Cybersecurity Assessments | Compliance and Certification

By: Schellman
February 2nd, 2023

So you’ve committed to an audit. Your customers were asking, or maybe a new regulation came into effect that your organization is now subject to—whatever the reason was, you’ve got to get audited because your audit team is confirmed.

{