SchellmanCON is back! Join us for our virtual conference on March 6 & 7, 2025

Contact Us
Services
Services
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
Sustainability Services
Sustainability Services
AI Services
AI Services
About Us
About Us
Leadership Team
Leadership Team
Corporate Social Responsibility
Corporate Social Responsibility
Careers
Careers
Strategic Partnerships
Strategic Partnerships

The Schellman Blog

Stay up to date with the latest compliance news from the Schellman blog.

Blog Feature

Cybersecurity Assessments | Payment Card Assessments

By: Sully Perella
February 16th, 2022

Let’s try this: equate your payment software to a batch of brownies.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Philip Holbrook
February 1st, 2022

These days, Mac-based corporate environments can be likened to the Tooth Cave Spider.

Blog Feature

Cybersecurity Assessments | SOC Examinations

By: JORDAN HICKS
January 26th, 2022

Though cybercrime reportedly rose 600% due to the global pandemic we’re in, it’s been a steadily growing problem for years. As you may know, suffering a data breach means you also suffer extra mitigation costs, but more critically, you lose the trust of your customer. That’s something you absolutely need to avoid, and SOC for Cybersecurity–created to help organizations particularly worried about cyberattacks–can help you do that.

Blog Feature

Cybersecurity Assessments | Payment Card Assessments

By: Sully Perella
January 14th, 2022

Did you know? With over 69 years on the throne, Queen Elizabeth II is the longest reigning monarch in British history. After her, Charles, the Prince of Wales will ascend to the throne, his son William will follow, and so on.

Blog Feature

Cybersecurity Assessments

By: Schellman
December 22nd, 2021

Maybe you’re ahead of the game, but in today’s day and age, more and more organizations are recognizing the inherent advantages to fostering a multigenerational workforce.

Blog Feature

Cybersecurity Assessments | Penetration Testing

By: Rene Guerra
November 18th, 2021

(And Why I Did It) For those of you who work in web application security, maybe you’re familiar with Burp.

Blog Feature

Cybersecurity Assessments

By: Schellman
October 28th, 2021

We all know that cybercriminals are now a thing.

Blog Feature

Cybersecurity Assessments | NIST

By: BRYAN HARPER
June 30th, 2021

Background First coined in 1994 by Stephen Marsh in his doctoral thesis, Formalising Trust as a Computational Concept, the term Zero Trust was later popularized by a Gartner research analyst. Some years later in 2011, when Google announced its internal implementation of Zero Trust architecture, the concept helped spark a new, wide-spread interest in the technology and security communities. In response to this increased public interest, the National Institute of Standards and Technology (NIST), in coordination with the National Cybersecurity Center of Excellence (NCCoE), developed a special publication (SP 800-207) on Zero Trust architecture and have since published additional information on implementation practices.

{