Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Understanding and Demonstrating Alignment with the GDPR

    Understanding and Demonstrating Alignment with the GDPR

    Read Flipbook
  • 7 Steps Toward Audit Readiness

    7 Steps Toward Audit Readiness

    Going through an audit can be painless if you effectively plan and prepare. See the 7-step checklist that will help you better handle this exercise.

    Read Flipbook
  • Optimizing The Audit2:45

    Optimizing The Audit

    A Buck For Your Thoughts - Episode 001

    Watch Video
  • ×



    Subscribe now
    to receive content updates once a week

    First Name
    !
    Success
    Error - something went wrong!
  • CaCPA - United States: It's our turn2:15

    CaCPA - United States: It's our turn

    Many predicted the U.S. would follow the GDPR, but this soon?

    Watch Video
  • PCI in 3…2…1

    PCI in 3…2…1

    A fresh new release of the PCI SSC's flagship security standard PCI-DSS v 3.2.1

    Read Article
  • California Privacy Act Vs. The General Data Protection Regulation

    California Privacy Act Vs. The General Data Protection Regulation

    Organizations across the globe are making their way back to the ‘war room’ to analyze their applicability against one of the most comprehensive data privacy laws sweeping the US

    Read Article
  • California Privacy Act Vs. The General Data Protection Regulation

    California Privacy Act Vs. The General Data Protection Regulation

    Can you rely on GDPR to satisfy the requirements of CaCPA?

    Read Flipbook
  • Security in a Post-GDPR World

    Security in a Post-GDPR World

    With so much focus on organizational compliance and privacy adoption, it’s easy to overlook the important role that individuals can play as their own privacy and security advocates....

    Read Article
  • Tax Pros Struggle With ‘Brute Force’ Cyberattacks

    Tax Pros Struggle With ‘Brute Force’ Cyberattacks

    Tax professionals handling their clients’ personal information can’t rely on vigilance alone to thwart hackers trying to gain access to their mobile devices.

    Read Article
  • Technology vs. The Human

    Technology vs. The Human

    The digital age has completely recalibrated society, as there has been a major transformation in how society lives, acts, works and plays.

    Read Article
  • How Smart Contracts Can Create a Competitive Edge

    How Smart Contracts Can Create a Competitive Edge

    Removing third parties speeds transactions and reduces their cost CFOs and finance departments are always looking for reductions in cost and increases in speed and efficiency in...

    Read Article
  • ComplyRight Data Breach Affects 662,000, Gets Lawsuit

    ComplyRight Data Breach Affects 662,000, Gets Lawsuit

    A data breach at ComplyRight, a firm that provides HR and tax services to businesses, may have affected 662,000 people, according to a state agency. It has also prompted a lawsuit,...

    Read Article
  • Schellman Recognized as a Top 100 Accounting Firm by INSIDE Public Accounting

    Schellman Recognized as a Top 100 Accounting Firm by INSIDE Public Accounting

    Schellman has been ranked as one of the largest accounting firms in the United States by INSIDE Public Accounting

    Read Article
  • Schellman to Join PCI Global Executive Assessor Roundtable (GEAR)

    Schellman to Join PCI Global Executive Assessor Roundtable (GEAR)

    Schellman is pleased to announce that it will join the newly founded Global Executive Assessor Roundtable, the advisory group of senior executives at assessor companies for the payment...

    Read Article
  • GDPR and Its Effect Since the Go-Live Date

    GDPR and Its Effect Since the Go-Live Date

    The General Data Protection Regulation (GDPR), which has now come into force, has a primary aim of strengthening the data rights of European Union residents. Moreover, it helps...

    Read Article
  • Tips for Creating a Security Whistleblower Strategy

    Tips for Creating a Security Whistleblower Strategy

    When you hear the word “whistleblower,” do you think business traitor or Good Samaritan? In most company cultures, it tends to be the former, which is unfortunate because more often than not,...

    Read Article
  • What is Considered PHI or ePHI?

    What is Considered PHI or ePHI?

    The question of what is considered Protected Health Information (PHI) / Electronic Protected Health Information (ePHI) seems like it should be very simple to answer.  Unfortunately,...

    Read Article
  • Rolling the Dice on AI

    Rolling the Dice on AI

    Moving forward, I would like to see machine learning incorporated in to web application scanning, an area untouched by AI today.”

    Read Article
  • California Consumer Privacy Act of 2018 and Its Impact on Businesses

    California Consumer Privacy Act of 2018 and Its Impact on Businesses

    Last month, the California Consumer Privacy Act of 2018 was passed by California legislature, expanding the definition of personal data and including more rights for California residents.

    Read Article
  • HIPAA Risk Analysis and Risk Management Program Considerations

    HIPAA Risk Analysis and Risk Management Program Considerations

    Over 90 percent of the Office for Civil Rights (OCR) HIPAA settlement actions regarding ePHI breaches involved findings of an insufficient risk analysis or risk management program. This...

    Read Article
  • Crypto Currency Hacking Is Not About The Coin

    Crypto Currency Hacking Is Not About The Coin

    Two weekends ago the South Korean cryptocurrency exchange Coinrail announced a hacking attempt on its website. With no more detail than a statement that said there was activity of a...

    Read Article
  • Schellman Tops the List: 10 Top Companies for Compensation & Benefits

    Schellman Tops the List: 10 Top Companies for Compensation & Benefits

    See the full article and top 10 list on glassdoor's blog

    Read Article
  • Bridging the Gap Between Security and Privacy

    Bridging the Gap Between Security and Privacy

    Security Geeks and Privacy Peeps

    Read Article
  • ×



    Subscribe now
    to receive content updates once a week

    First Name
    !
    Success
    Error - something went wrong!
  • loading
    Loading More...