The Hypothetical Cloud Organization
Before you jump in with both feet to the cloud, you’ll want to make sure you’re setting yourself up for success. Whether you’re a single person starting a new company or an established organization, everyone needs to same components of cloud organization to be successful. Read on to learn more about the key components of setting up your cloud infrastructure without losing sight of key risk mitigation components.
Colorado Privacy Law: Requirements, Scope, and Impact on Companies
With July just around the corner, there’s no better time to refresh your memory on the obligations you may have to comply with consumer rights for Colorado residents. Check out our fast facts on the requirements, and our advice on operationalizing controls within your technology environment to meet those!
Education Data and Privacy
There have been long standing use cases for purchasing and using this data, along with laws the impose restrictions on that use. Learn more about the types of data that qualify for these restrictions, and what you need to do in order to continue using that data!
Contract Traps for Startups
Business to business (B2B) tech startups can easily fall into the trap of contract fraud, which can lead to serious legal consequences and damage to their reputation. Learn more today about easy ways to avoid falling into this trap and exposing your new company to excessive risk.
Blast radius of risk in AWS
It’s critical in your cloud environment to understand the downstream and upstream risk exposed to your environment when you make different security and infrastructure choices. Click here to learn about evaluating your blast radius of risk, and how to mitigate impact to your environment!
Ethical walls and their importance for data privacy
Understanding what an ethical wall looks like and how to set it up effectively will set up your organization for great future success, and allow senior leaders to consistently monitor and track success metrics. Learn more today about the key components and how you can use what you already have to expeditiously grow your compliance programs!
Apache Spot… the end of the road
Now’s a great time to check out one of our past projects; the Apache Spot Project. Learn more today from our CEO Austin Leahy!
GLBA Safeguards Rule and impact on compliance programs
Changes to federal security and privacy law means everyone should take a look back at their controls and make sure they’ve accounted for the new requirements within their tech. Learn more today about the considerations you should have for your compliance programs as these laws evolve!
What is Zero Trust?
Zero trust is a security model that assumes that any user, device, or application attempting to access a network or resource cannot be trusted by default. Click here to learn more about setting up zero trust models from Tadd Wood!
Cloud vs. on-premise costs, and your security responsibilities in AWS
Moving to the cloud can seem easy at first, but it’s important not to take on too much spend accidentally by not setting up your environment the right way. Read here about the best tips we have to manage your cloud spending and risk!