Our Blog
![Information Security Governance](https://ermprotect.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Information Security Governance
Cybersecurity and hacker attacks are among the top concerns that organizations worldwide face today. The concern is justified, given the visibly exponential rise in successful hacker attacks and volumes of
![Do the Benefits of Artificial Intelligence Outweigh the Risks?](https://ermprotect.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Do the Benefits of Artificial Intelligence Outweigh the Risks?
Plainly put, AI involves programming machines in a way that they are able to think on their own like we do. AI is all about impersonating human intelligence.
![How Criminals Use the Dark Web for Illicit Activities](https://ermprotect.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
How Criminals Use the Dark Web for Illicit Activities
If not for hackers grabbing headlines every other day, we probably wouldn’t be talking about this topic. It wouldn’t have been as interesting. In fact, you would’ve never even noticed
![Board Information Security Risk Oversight](https://ermprotect.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Board Information Security Risk Oversight
How can a board protect itself from information security litigation and demonstrate its compliance with the business judgement rule?
![What You Really Need to Know About the General Data Protection Regulation (GDPR)](https://ermprotect.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
What You Really Need to Know About the General Data Protection Regulation (GDPR)
Chances are that you have heard the term ‘GDPR’ but, so many people are still not aware of what GDPR is and what it will mean for their business in
![The Key Differences Between SSAE-16 and SSAE-18 Assessments](https://ermprotect.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
The Key Differences Between SSAE-16 and SSAE-18 Assessments
Organizations are demanding independent assessments of the IT and security control measures of their third party organizations.