Our Thoughts On

Sort by

Categories
Authors

IT Risk Advisory

Articles 11 - 20 of 54

Understanding SOC Report Opinions

Learn about the four types of SOC report opinions.

SOC 2 - What is ACTUALLY required?

Learn about some of the most common misconceptions about SOC 2 reports.

Update on GLBA for Higher Ed

Learn more about the new compliance requirements institutions must now follow for the Gramm-Leach-Bliley Act (GLBA).

A First of Its Kind: The $25 Million Deepfake Scam

Learn how scammers used a deepfake attack to steal more than $25 million from a multinational firm.
Register to receive our weekly newsletter with our most recent columns and insights.

Postcard from the 2023 ISACA Pittsburgh Information Security Awareness Day

Explore some of the key takeaways from the 2023 ISACA Pittsburgh Information Security Awareness Day conference.

President Biden Signs Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence

Learn more about President Biden's Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence.

Americans with Disabilities Act – What to Know about Web Content Accessibility Guidelines 2.1

Learn about the importance of complying with the Web Content Accessibility Guidelines of the Americans with Disabilities Act.

Prevention and Detection – Key Methods to Protect Against Identity Fraud

Learn the key methods to prevent and detect identity fraud before it happens to you.
Register to receive our weekly newsletter with our most recent columns and insights.

Top 5 Identity Fraud Schemes of 2023

Learn about the top identity fraud schemes of 2023 and how to detect fraud before it happens to you.

Identity Theft vs. Identity Fraud – What’s the Difference?

Learn about the distinction between identity theft and identity fraud and why it matters.
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×