Blog

To locate a specific post or topic, simply use the search box on the upper right next to the magnifying glass icon

  • How to Prepare for a HIPAA Assessment: A Guide for Healthcare Organizations

    How to Prepare for a HIPAA Assessment: A Guide for Healthcare Organizations

    Considering a HIPAA assessment? Whether you choose to perform it internally or engage an independent third party, we share 7 steps to focus your preparation and boost your compliance.

    Read Article
  • ×

    First Name
    !
    Success
    Error - something went wrong!
  • Early Insight into a PCI DSS v4.0 Assessment

    Early Insight into a PCI DSS v4.0 Assessment

    Having already assessed organizations against the new PCI DSS v4.0, we're publishing the insight gained to help you understand more of what's coming and boost your preparation for the new standard.

    Read Article
  • What is the New National Cybersecurity Strategy?

    What is the New National Cybersecurity Strategy?

    With the release of the Biden Administration's new cybersecurity strategy in March 2023, cybersecurity has become an American priority. We break down the details, as well as how you can prepare.

    Read Article
  • How to Get HITRUST Certified: 4 Steps

    How to Get HITRUST Certified: 4 Steps

    Not sure what you're getting into with HITRUST certification? We break down the complete process into 4 steps so you can know what to expect and how to get from start to finish.

    Read Article
  • Schellman Appoints Michael Parisi as Head of Client Acquisition to Focus on Aggressive Market Expansion

    Schellman Appoints Michael Parisi as Head of Client Acquisition to Focus on Aggressive Market Expansion

    Schellman welcomes Michael Parisi as our new Head of Client Acquisition to assist as an integral part of our proactive growth initiatives.

    Read Article
  • What Banks Need to Know about PCI DSS v4.0

    What Banks Need to Know about PCI DSS v4.0

    PCI DSS v4.0 is a big shift for everyone involved in payment transactions, but we explain what and why those specifically in the banking industry should take a closer look at the updated standard.

    Read Article
  • What to Expect from a FedRAMP Moderate Assessment

    What to Expect from a FedRAMP Moderate Assessment

    Considering a FedRAMP Moderate Assessment? We break down what to expect from the process, the elements that will be evaluated, and specific areas to take care of so you can streamline your experience.

    Read Article
  • How to Use Strong Protocols and Cipher Suites to Achieve PCI DSS Compliance with TLS v1.2

    How to Use Strong Protocols and Cipher Suites to Achieve PCI DSS Compliance with TLS v1.2

    Defining the secure exchange of data is critical for PCI DSS compliance. To help you do that more easily, we break down all the elements, which ones are stronger than others, & how they work together.

    Read Article
  • What Happens During a Web Application Penetration Test?

    What Happens During a Web Application Penetration Test?

    Wondering how a web application penetration test actually works? We overview the 4 steps of our process so that you can know what to expect from your engagement.

    Read Article
  • The Timeline for HITRUST CSF v11

    The Timeline for HITRUST CSF v11

    With the debut of HITRUST CSF v11, it's important to know the dates for the phase-out of previous versions. We break down how it'll work for the i1 & r2 assessments so your transition goes smoothly.

    Read Article
  • Compliance in Italy: Navigating the New Cloud Italy Strategy

    Compliance in Italy: Navigating the New Cloud Italy Strategy

    With the debut of the Cloud Italy Strategy, cloud service providers may need to adhere to the new requirements. We break these down so that you can more easily jumpstart your compliance.

    Read Article
  • Do You Need an Internal Audit Team? Benefits and Alternative Efficiencies

    Do You Need an Internal Audit Team? Benefits and Alternative Efficiencies

    Internal audit teams can be big boons to an organization, but they're not always an option. We explain the benefits of these teams as well as an alternative to pursue for similar efficiency yields.

    Read Article
  • HITRUST CSF v11: An Overview of the Update

    HITRUST CSF v11: An Overview of the Update

    Now that HITRUST has released a new version of CSF, we explain what changes and updates have been made to your HITRUST assessment options in version 11. “New year, new me!”

    Read Article
  • ISO 27001: How Important is Management Buy-In?

    ISO 27001: How Important is Management Buy-In?

    Understand the true depth of the role management plays in a potential ISO 27001 certification, as laid out in clauses 5 & 9.3, so that you can better set expectations with leadership at your firm.

    Read Article
  • How to Use Branch Protection in Change Management

    How to Use Branch Protection in Change Management

    Current pace of software releases making it difficult to remain compliant with change management requirements? Learn how branch protection can help you in this & keep your software development secure.

    Read Article
  • How to Scope Your ISO 27001 Certification

    How to Scope Your ISO 27001 Certification

    Looking for insight on where to draw the boundaries of your ISMS? We break down the scoping clauses of the ISO 27001 standard so that you have a starting point regarding what needs to be included.

    Read Article
  • Joining the Fight Against Heart Disease: My Journey as a Woman of Impact

    Joining the Fight Against Heart Disease: My Journey as a Woman of Impact

    For the 2nd year in a row, Schellman is participating in Go Red for Women, & in 2023, CEO Avani Desai is nominated as a Women of Impact. Read on to find out more about our campaign and how to donate.

    Read Article
  • How to Prepare for Compliance Audits

    How to Prepare for Compliance Audits

    No matter what framework you're being evaluated against, there are certain things you should do to prepare for a compliance audit—here are 5 steps to take for a better audit experience.

    Read Article
  • Get CISSP Certified: A Self-Study Guide to Success

    Get CISSP Certified: A Self-Study Guide to Success

    For those seeking the coveted CISSP certification, we put together a self-study guide and some useful resources that led one of our team to a successful exam and may help you too.

    Read Article
  • What is SOC 2 + HITRUST?

    What is SOC 2 + HITRUST?

    SOC 2 + HITRUST presents a useful combined approach, but is it right for you? We explain the advantages of this route as well as some considerations before you decide.

    Read Article
  • loading
    Loading More...