markderijkDec 5, 20236 minSOC 2: What is it and how does the process look likeWhat is SOC2 compliance? In today's digital age, data security is of utmost importance. How can businesses ensure that they are...
markderijkDec 21, 20212 minLog4j - a TLDR summary for SME IT leadersTLDR Log4J is a logging library for Java applications for which critical vulnerabilities was discovered. An unauthenticated remote actor...
markderijkJul 8, 202120 minHow to differentiate your business with Diversity and Inclusion with Colleen Tartow Ph.D.Intro Hi and welcome to today's SME Business podcast, your host, Mark, will be joining you to interview a founder of an SME business each...
markderijkJun 17, 20213 minWhat is a canary in the field of cyber securityWhat is a Canary? Other than obviously being a bird, back in the day, a canary would be a prized possession for miners around the world....