Our Thoughts On

Sort by

Categories
Authors

IT Risk Advisory

Articles 1 - 10 of 48

IPE 101 – Differentiating Populations and Key Reports

Learn more about the two primary categories of information produced by entity in SOX testing.

IPE 101 – Defining and Understanding Information Produced by Entity

Learn more about the importance of IPE completeness and accuracy in SOX testing.

Get the Low Down Before You Download: Exploring the Temu App’s Security Risks

Learn more about the privacy risks associated with the Temu mobile app.

Understanding SOC Report Opinions

Learn about the four types of SOC report opinions.
Register to receive our weekly newsletter with our most recent columns and insights.

SOC 2 - What is ACTUALLY required?

Learn about some of the most common misconceptions about SOC 2 reports.

Update on GLBA for Higher Ed

Learn more about the new compliance requirements institutions must now follow for the Gramm-Leach-Bliley Act (GLBA).

A First of Its Kind: The $25 Million Deepfake Scam

Learn how scammers used a deepfake attack to steal more than $25 million from a multinational firm.

Postcard from the 2023 ISACA Pittsburgh Information Security Awareness Day

Explore some of the key takeaways from the 2023 ISACA Pittsburgh Information Security Awareness Day conference.
Register to receive our weekly newsletter with our most recent columns and insights.

President Biden Signs Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence

Learn more about President Biden's Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence.

Americans with Disabilities Act – What to Know about Web Content Accessibility Guidelines 2.1

Learn about the importance of complying with the Web Content Accessibility Guidelines of the Americans with Disabilities Act.
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×