Made With Uberflip Content Marketing

Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • 7 Steps Toward Audit Readiness

    7 Steps Toward Audit Readiness

    Going through an audit can be painless if you effectively plan and prepare. See the 7-step checklist that will help you better handle this exercise.

    Read Flipbook
  • Demystifying the Cyber NISTs56:10

    Demystifying the Cyber NISTs

    Watch Video
  • The Whys and Wherefores of Innovation in the World of Cybersecurity

    The Whys and Wherefores of Innovation in the World of Cybersecurity

    Here we are in 2017, and it seems as if there is at least one new security firm filing papers in Delaware almost every day. Cybersecurity is a hot topic, with security threats and...

    Read Article
  • ×

    Subscribe now
    to receive content updates once a week

    First Name
    !
    Success!
    Error - something went wrong!
  • New Strain of Linux Malware Could Get Serious

    New Strain of Linux Malware Could Get Serious

    A new strain of malware targeting Linux systems, dubbed "Linux/Shishiga," could morph into a dangerous security threat.

    Read Article
  • Generational Stereotypes and Conflict Management

    Generational Stereotypes and Conflict Management

    Generational differences speak loudly in today’s workplace as one of the main reasons for conflict at work.

    Read Article
  • What 2018 Means for Your PCI DSS Assessment

    What 2018 Means for Your PCI DSS Assessment

    Some of you may have just read the blog title and believe I made a typo on the year, but no, I am here to talk about PCI DSS in 2018. I know it seems crazy to be discussing 2018, as we...

    Read Article
  • Understanding HITRUST with Advize Health1:07:53

    Understanding HITRUST with Advize Health

    Watch Video
  • Cloud Service Providers Navigating through the GDPR59:08

    Cloud Service Providers Navigating through the GDPR

    Watch Video
  • Why There Really Is No Such Thing As a Free App (or Lunch)

    Why There Really Is No Such Thing As a Free App (or Lunch)

    There was a quiet revolution that took place a while back within the marketing landscape. Investors were falling over themselves to invest in an idea known as ‘targeted marketing’ or...

    Read Article
  • About Schellman

    About Schellman

    Read Flipbook
  • Stutay In The City - 2017 Data Protection Intensive Conference in London

    Stutay In The City - 2017 Data Protection Intensive Conference in London

    Recently, the Data Protection Intensive has come into its own as a leading forum for practical data protection education.  Now considered to be one of the best conferences of the year,...

    Read Article
  • And Then, Suddenly, Women Stopped Coding. What Happened in 1984?

    And Then, Suddenly, Women Stopped Coding. What Happened in 1984?

    Finally, a tech-savvy Barbie.

    Read Article
  • ISO 270182:33

    ISO 27018

    What is ISO 27018 and do you need to be assessed against it?

    Watch Video
  • SSAE 18 and Other Famous Acronyms1:00:22

    SSAE 18 and Other Famous Acronyms

    How the New Standard Affects Your SOC 1

    Watch Video
  • Is the Internet of Things the Next Trojan Horse?

    Is the Internet of Things the Next Trojan Horse?

    On 21 October 2016, something happened that could have been straight out of a science fiction movie. Many parts of the Internet, which we take for granted, stopped working. Twitter went...

    Read Article
  • Docker and PCI Compliance

    Docker and PCI Compliance

    Executive Summary Docker is an advanced framework for deploying applications--in particular, cloud applications.  It is notably different than working within traditional virtualization...

    Read Article
  • HITRUST Changes on the Horizon

    HITRUST Changes on the Horizon

    A few weeks ago, HITRUST unveiled changes to its HITRUST Certification program that will certainly have an impact on healthcare organizations of all sizes. A few weeks ago, HITRUST unveiled

    Read Article
  • HITRUST Webinar with Advize Health

    HITRUST Webinar with Advize Health

    Thursday, March 30th | 2:00PM - 3:30PM EST

    Read Article
  • The Importance of ISO 270011:00:01

    The Importance of ISO 27001

    And Why Management Should Embrace It

    Watch Video
  • Compliance as Code

    Compliance as Code

    Codifying Your Configuration Standards If you have already gone through a PCI DSS, SOC, HIPAA/HITECH, or ISO assessment, you already know that detailed configuration standards are a...

    Read Article
  • Your Guide to ISO 27001

    Your Guide to ISO 27001

    ISO 27001 is a valuable way to identify, mitigate and monitor your company’s information security risk.

    Read Flipbook
  • loading
    Loading More...