Occasionally on penetration testing/ethical hacking engagements we encounter misconfigured mail servers which creates an opportunity to either gather information
The majority of cyber-attacks are not targeted, rather they are opportunistic, using automated phishing and vulnerability scans. Attackers usually identify
If your company takes credit cards, you may be wondering if you are required to have a penetration test. In the past, it had been voluntary, but with PCI
What is the SEC Looking For in Your Internal Control Environment?
This Article was co-written by Nicole Saldamarco At the recent AICPA year-end conference, SEC staff members indicated that they will be looking more closely
Addressing Technology Risks within the Financial Services Industry
As rapidly as technology evolves, so does the inherent risk surrounding that technology. It has now become ever so critical to ensure appropriate mitigation
SOC 2 Examinations - What Are the Trust Services Criteria and Categories?
The 2017 Trust Services Criteria (TSC), which superseded the 2016 Trust Services Principles and Criteria (TSPC), serves as the control criteria for attestation
This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.