SECURITY
XAM
The 10-minute guide to SOC 1 vs. SOC 2
For companies looking to get SOC 1 or 2 compliant, it can be hard to find out where to start, so …
Continue readingFor companies looking to get SOC 1 or 2 compliant, it can be hard to find out where to start, so …
Continue readingWe’re trying to answer all the privacy questions employees might have around their …
Continue readingCalifornia’s data protection law applies not just to consumers, but to employees. And …
Continue readingFor companies looking to get their data practices in order, the ISO 2700 standards provide a …
Continue readingWhen the medical mission is at odds with security policies, patients and clinicians suffer.
Continue readingFor bad actors, using synthetic voices is easy, cheap, and worryingly effective.
Continue reading