Contact Us
Services
Services
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
Sustainability Services
Sustainability Services
AI Services
AI Services
About Us
About Us
Leadership Team
Leadership Team
Corporate Social Responsibility
Corporate Social Responsibility
Careers
Careers
Strategic Partnerships
Strategic Partnerships

The Schellman Blog

Stay up to date with the latest compliance news from the Schellman blog.

Blog Feature

Cybersecurity Assessments | Payment Card Assessments

By: Sully Perella
January 14th, 2022

Did you know? With over 69 years on the throne, Queen Elizabeth II is the longest reigning monarch in British history. After her, Charles, the Prince of Wales will ascend to the throne, his son William will follow, and so on.

Blog Feature

Cybersecurity Assessments

By: Schellman
December 22nd, 2021

Maybe you’re ahead of the game, but in today’s day and age, more and more organizations are recognizing the inherent advantages to fostering a multigenerational workforce.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Rene Guerra
November 18th, 2021

(And Why I Did It) For those of you who work in web application security, maybe you’re familiar with Burp.

Blog Feature

Cybersecurity Assessments

By: Schellman
October 28th, 2021

We all know that cybercriminals are now a thing.

Blog Feature

Cybersecurity Assessments | Payment Card Assessments | NIST | PCI DSS

By: Sully Perella
June 30th, 2021

These days, you can never have too many cybersecurity measures in place, particularly given how regularly threats continue to escalate and grow in sophistication. Now, many organizations are turning to, or considering adopting, Zero Trust (ZT)—a less traditional security model based on the principle of "never trust, always verify.”

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: MATT WILGUS
June 17th, 2021

During a penetration test, the Schellman team often works with development teams, administrators, risk and compliance professionals and information security personnel; however, the initial point of contact for a penetration test may be an individual that isn’t any of those. More and more, someone from the product or procurement team may have the responsibility—or shared responsibility—of having a penetration test performed. While these individuals may understand a timeline for a specific task, they likely do not have full visibility into the entire project. Such circumstances, among others, can trigger one of the biggest challenges frequently seen in planning pen tests—timing.

Blog Feature

Cybersecurity Assessments | FedRAMP | Federal Assessments

By: Douglas Barbin
May 13th, 2021

Yesterday, on May 12th, President Biden issued the “Executive Order (EO) on Improving the Nation’s Cybersecurity.” Given that the Order features 11 sections that include both policy and general provisions among others, its 8,080 words is arguably the equivalent of multiple EOs. Such an effort is, no doubt, purposeful by the President—this is significant, and will certainly impact the security worlds of both the government itself and those companies that provide it with software and services.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Wes Dorman
May 5th, 2021

Overview Offensive Security has released several new courses recently, including Evasion Techniques and Breaching Defenses (PEN-300), which primarily focuses on “penetration tests against mature organizations with an established security function.” After reading that overview on the website, I was excited to take on the challenge and expand my knowledge base in preparation for obtaining the OSEP certification.

{