OCD Tech

517 posts

OCD Tech banner
OCD Tech

OCD Tech

@TheOCDTech

Helping our clients with IT Security Advisory & Assurance services. (SOC2, pen testing, regulatory compliance, etc)

Massachusetts, USA เข้าร่วม Aralık 2015
810 กำลังติดตาม416 ผู้ติดตาม
OCD Tech
OCD Tech@TheOCDTech·
On June 13, ransomware group 8Base exposed evidence of a significant data breach targeting a large Midwestern automotive group, including financial statements, driver’s licenses, and addresses. Read the complete article: ocd-tech.com/2023/06/17/aut…
English
0
0
2
142
OCD Tech
OCD Tech@TheOCDTech·
Obtaining CISA certification by @ISACANews , can be a valuable investment in your career as an IT security professional. But what does it take to become certified, and what are the benefits of doing so? Visit @TheOCDTech : ocd-tech.com/2023/05/26/cis…
OCD Tech tweet media
English
0
0
0
71
OCD Tech
OCD Tech@TheOCDTech·
Since the extension of the FTC Safeguards June 9th deadline was announced, the @FTC has gone silent. Many are wondering what the significance is and what is next? Read this interesting article by Nicholas Reed and David Cantor-Adams at @TheOCDTech #blog ocd-tech.com/2023/05/22/ftc…
OCD Tech tweet media
English
0
0
0
65
OCD Tech
OCD Tech@TheOCDTech·
💡What is next for AI? Compliance with the NIST AI Risk Management Framework is voluntary, but offers a powerful and relevant tool to organizations. Learn more about National Institute of Standards and Technology (NIST) framework at OCD Tech #blog: ocd-tech.com/2023/04/14/nis…
English
0
0
1
70
OCD Tech
OCD Tech@TheOCDTech·
PAM is one of the most critical aspects of a strong information security program that every company needs to incorporate to mitigate the risks. Visit @TheOCDTech #blog and keep your business protected ocd-tech.com/2023/02/28/pam…
English
0
0
1
60
OCD Tech
OCD Tech@TheOCDTech·
Congrats to Jill Kamperides & Adam Maraziti! "Best of 2022" @PenTestMag, for their articles on Windows Privilege Escalation: The Concepts of Hijacking Execution Flow and Understanding Microsoft Office Trusted Locations Workflow and How It Can Be Exploited. lnkd.in/dD8j8Qzc
English
0
0
1
36