Category: News

Why Buying SaaS GRC Software Is a Smart Investment

Written by
Published 07/27/2017

Why Buying SaaS GRC Software Is a Smart Investment   Cloud versus on premise GRC software: a CIO’s dilemma? Well, maybe, and maybe not. Cloud based software solutions or cloud based computing is provides the CIO, CISO, CEO, CFO, and director an agile business process. IDG in its 2014 study shows that 69% of enterprises had applications and infrastructure running in the cloud. Looking at such statistics, you are forgiven for thinking that everyone is moving to the cloud: after all, if something is in the cloud it is better, right? The truth is there are those who are sticking to on premise software. In as much as this on premise vs. cloud debate is raging, I would like to…

Tags: ,
Categorized in:

How Today’s Credit Card Controls Evolved from a Lost Wallet

Written by
Published 06/22/2017

Credit cards have come a long way since the night in 1949 when Frank McNamara, out for dinner with his clients, realized he had forgotten his wallet and wished for some sort of account to which he could charge the dinner. Frank soon started the Diners’ Club card. By the close of the 1950s, tens of thousands of Americans held credit cards, issued by banks still recognized today, like Bank of America and American Express. Even though these first credit cards were made from cardboard, people, even then, realized the value of implementing credit card controls into their use. And, before the first decade of credit card use came to a close, plastic credit cards started to emerge. As advances have…

Tags: ,
Categorized in:

The Fine Art of Scoping a SOC 2 Audit

Written by
Published 05/16/2017

The Fine Art of Scoping a SOC 2 Audit Once upon a time, performing a SOC 2 audit was a rite of passage for service companies: “Wow, we’re so successful now that big clients want us to do important things, and we need a SOC 2 audit to prove our street cred!” Times have changed. In today’s cybersecurity world, the SOC 2 audit is more like a fact of life: “Yikes, if we can’t pass a SOC 2 audit to document our security controls, nobody will give us the time of day.” That’s no easy task for a small firm, and setting the scope of your SOC 2 audit correctly is crucial. Define the scope too narrowly, and you might…

Tags: , ,
Categorized in: