Open Mobile Menu

Contact us for a free consultation.

Learn more

Security Testing

We provide thorough assessments of all types of applications, networks, and infrastructure with guidance for improving your security posture.

Strategic Consulting

Our team of Security Experts provide industry-leading Risk Assessment, Project Management, and InfoSec Program and Policy Development services.

Compliance, Privacy, and PCI

Audit preparation, compliance, and privacy services with a focus on real security.  Our experienced staff can help you reach your security, privacy, and compliance goals in a manner best suited to your unique requirements.

Training

We offer engaging and interactive security awareness and technical training, both online and instructor-led.

From the Blog

Creating Good PCI-DSS Network and Data Flow Diagrams

Leo Boike

Leo Boike

January 28, 2019

Views: 135

The most useful documents required of PCI-DSS are covered in PCI-DSS requirements 1.1.2 (network diagram) and 1.1.3 (data flow diagram).  Depending on the complexity of your network and processes, you could have one combined network and data flow diagram or you may require multiple diagrams.

Filed In: PCI DSS

PCI 101: Transaction Volumes and Validation Requirements

Chip Ross

Chip Ross

January 02, 2019

Views: 185

Regarding PCI compliance, all entities that store, process or transmit cardholder data are subject to the requirements of the PCI Data Security Standard (PCI DSS). Merchant or Service Provider Level, and how cardholder data is handled normally determine how an entity is required to validate compliance.

Filed In: SOC 1/2

It’s Time to Use the Latest SOC 2 Trust Services Criteria, Are You Ready?

Matthew Cooper

Matthew Cooper

December 14, 2018

Views: 4647

Starting this weekend, all SOC 2 reports with review periods ending after December 15th, 2018 must be conducted using the American Institute of Certified Public Accountants’ (AICPA) April 2017 release of the Trust Services Criteria. This blog post describes the major changes to the criteria and provides some advice for using it to prepare for your next SOC 2 audit.

News & Events