The Compass:
More posts
![](https://cdn.prod.website-files.com/64352e4889525a0a8fed9833/6658da8c20d33692110ea391_3_742%E2%80%8A%C3%97%E2%80%8A610.png)
Article
ChatGPT and Security
Jemurai shares their ideas and research to present a balanced view on the security implications of using ChatGPT
READ MORE
![](https://cdn.prod.website-files.com/642ff28937bbf1fc6c797cd5/6433fb6c35c4e26e3ba24582_arrow-p.webp)
![](https://cdn.prod.website-files.com/64352e4889525a0a8fed9833/6437df2f1d0ce792e0ee34b4_post-3-min.png)
Article
How Penetration Testing Increases Your ROI of ISO 27001 Compliance
Software Secured shares exactly how penetration testing increases the ROI of your ISO 27001 compliance.
READ MORE
![](https://cdn.prod.website-files.com/642ff28937bbf1fc6c797cd5/6433fb6c35c4e26e3ba24582_arrow-p.webp)
![](https://cdn.prod.website-files.com/64352e4889525a0a8fed9833/6658dc074d3771676acb720c_4_742%E2%80%8A%C3%97%E2%80%8A610.png)
Article
Mike DeKock on Building Competitive Advantage
How do the value creation principles of subjective value, entrepreneurship and creativity apply in a highly technical rules-based environment like SOC Compliance audits. These are objective validations of data security measures based on customer-defined criteria similar to traditional financial audits but more specific and subjective.
READ MORE
![](https://cdn.prod.website-files.com/642ff28937bbf1fc6c797cd5/6433fb6c35c4e26e3ba24582_arrow-p.webp)