Blog

To locate a specific post or topic, simply use the search box on the upper right next to the magnifying glass icon

  • Rocky Mountain Information Security Conference 2018

    Rocky Mountain Information Security Conference 2018

    Join Schellman at the 2018 RMISC

    Read Article
  • ×



    Subscribe now
    to receive content updates once a week

    First Name
    !
    Success
    Error - something went wrong!
  • 5 Steps for an Auditor to Prepare for a SOC Report

    5 Steps for an Auditor to Prepare for a SOC Report

    Imagine this, it's a late Wednesday afternoon and you are wrapping up your previous SOC engagement while simultaneously working on your current engagement. A check of your upcoming...

    Read Article
  • The Dangers in Perpetuating a Culture of Risk Acceptance

    The Dangers in Perpetuating a Culture of Risk Acceptance

    This article details the prevalence of risk acceptance within organizations, why IT security departments may be putting too much confidence in their controls, and how excessive...

    Read Article
  • IoT Security: What Is It, And Why Does It Matter?

    IoT Security: What Is It, And Why Does It Matter?

    You may consider ‘IoT security’ an oxymoron and, unfortunately, for many IoT devices, you’re quite correct. The IoT and security don’t necessarily go together, with many companies and...

    Read Article
  • Women's representation in technology fields decreases as seniority increases, research shows

    Women's representation in technology fields decreases as seniority increases, research shows

    While the dearth of women CEOs is getting attention, there is another area—technology—in which their presence is also lacking.

    Read Article
  • Florida-Based Firm, Schellman, Recognized as a Top 100 CPA Firm

    Florida-Based Firm, Schellman, Recognized as a Top 100 CPA Firm

    TAMPA, Fla., March 21, 2018 /PRNewswire/ -- Achieving a goal many years in the making, Tampa based CPA firm,  Schellman & Company, LLC (Schellman), a leading provider of attestation and...

    Read Article
  • IT’s most wanted: 16 traits of indispensable IT pros

    IT’s most wanted: 16 traits of indispensable IT pros

    On a good tech team, cross training and clear documentation keep projects humming along — even when colleagues need to be away — averting disaster. That said, have you ever noticed that...

    Read Article
  • Navigating The New Outsourcing Relationship

    Navigating The New Outsourcing Relationship

    A new report found that 31% of IT services in the U.S were outsourced in 2017. The outlook for IT outsourcing is mixed, though, as Brexit seems set to shake up traditional notions of...

    Read Article
  • FedRAMP: Three Stages of Vulnerability Scanning and their Pitfalls

    FedRAMP: Three Stages of Vulnerability Scanning and their Pitfalls

    Though vulnerability scanning is only one of the control requirements in FedRAMP, it is actually one of the most frequent pitfalls in terms of impact to an authorization to operate...

    Read Article
  • Curtain Going Up On GDPR

    Curtain Going Up On GDPR

    Companies have had several years to prepare for GDPR yet many still are far from being fully compliant. With the launch deadline nearly upon us, Alan Earls reports on some...

    Read Article
  • Women still largely shut out as CEOs of Fortune 100 companies

    Women still largely shut out as CEOs of Fortune 100 companies

    Despite much talk and debate about more women becoming CEOs, it still isn’t happening.

    Read Article
  • The New Rules for Protecting Unstructured Data

    The New Rules for Protecting Unstructured Data

    How many places do you store work-focused unstructured data? For many people, handwritten notes, digitized ones in OneNote or Evernote, cloud-based storage systems, such as Dropbox and...

    Read Article
  • HIPAA Allows Choice in Password Security, But Use Caution

    HIPAA Allows Choice in Password Security, But Use Caution

    Password security for electronic protected health information (ePHI) is a fundamental part of any HIPAA compliance program, but there is no one right way. HIPAA allows a great deal of...

    Read Article
  • GDPR: What is the Right to Erasure?

    GDPR: What is the Right to Erasure?

    The other week, Chris Lippert, Privacy Technical Lead at Schellman, wrote an excellent blog post that explores overlaps and differences between GDPR and other frameworks, including...

    Read Article
  • 2018, well under way…

    2018, well under way…

    As we quickly have stepped into 2018, we should not forget to reflect on what 2017 meant to us – the good, the bad, and the ugly. It is important to allow ourselves the opportunity to...

    Read Article
  • Do Robots Deserve Legal Rights?

    Do Robots Deserve Legal Rights?

    Saudi Arabia made waves in late 2017 when it granted citizenship to a humanoid robot named Sophia, developed by the Hong Kong-based Hanson Robotics. What those rights technically...

    Read Article
  • GDPR vs. Existing Frameworks: Overlaps, Differences, and Filling the Gaps

    GDPR vs. Existing Frameworks: Overlaps, Differences, and Filling the Gaps

    Here’s the big question: Is the General Data Protection Regulation (GDPR) a revolutionary regulation that introduces new concepts of security and privacy? The answer — yes and no. The...

    Read Article
  • The New Database Technology Landscape From Relational to Blockchain

    The New Database Technology Landscape From Relational to Blockchain

    Cloud Advances Cloud computing, which has been a major force in the IT and data management space for close to a decade, continues to reshape database technologies as well. Cloud is...

    Read Article
  • The 11 Most Difficult IT Hires Today

    The 11 Most Difficult IT Hires Today

    Ask any recruiter or tech pro what roles are most hard to fill in 2018, and you won’t be shocked.

    Read Article
  • What does territorial scope mean under the GDPR?

    What does territorial scope mean under the GDPR?

    Determining an organization’s applicability under the General Data Protection Regulation is a complex topic, and many are left a bit confused  while researching applicability under the...

    Read Article
  • loading
    Loading More...