FILTER
compliance
The Best SOC 2 Compliance Checklist: What We Learned Passing SOC 2 Type 2
We learned so much passing SOC 2 Type 2 that we compiled it into the best SOC 2 compliance checklist! SOC 2...
READ MORE
A Beginners Guide to Today’s Top Federal Agency Frameworks
We put together a beginner’s guide to today’s top federal agency frameworks to help you avoid...
READ MORE
Secrets to Selecting the Right SOC 2 Vendor
In this article, we condense unbiased, expert research from Fractional CISO highlighting: Three core SOC 2...
READ MORE
ISO 27001 Bootcamp Part 2: Understanding Annex A Controls
Welcome to the second installment of Tugboat Logic’s ISO 27001 Bootcamp series. In part 1, we covered...
READ MORE
ISO 27001 Bootcamp Part 1: Scoping and Mandatory Clauses
Today, we’re kicking off installment number one of the highly anticipated ISO 27001 Bootcamp, where...
READ MORE
The Top 5 Security Questions Your Board Is Likely to Ask
Cyber risk is rising, prompting the board and senior leadership to ask more questions about cybersecurity....
READ MORE
Top 3 Things Every InfoSec Program Should Have
Establishing an InfoSec program enables your organization to build trust quickly so you can sell more....
READ MORE
Employees and Cyberthreats: To Err Is Human and Costly
It’s a common misconception that threat actors, individuals behind online attacks, live outside an...
READ MORE
How SyncMonkey Saved $100,000 and Hundreds of Hours on Their SOC 2 Project
“Tugboat Logic hasn’t just benefitted us—they’ve also benefited our customers. One of our big...
READ MORE
Why Your Security Program Needs Continuous Compliance
Continuous compliance isn't as difficult to maintain as you might imagine. And it's likely to save you time...
READ MORE
Building Trust With Security Assurance
By providing prospects and customers with security assurance, you can build stronger, more profitable...
READ MORE
The Security and Compliance Glossary
A useful collection of terms to help you navigate the security and compliance...
READ MORE