top of page


Feb 21, 2024
The Ultimate Guide to Staying Safe When Using Your Phone for Personal & Business
Protect your phone for personal and business use with our comprehensive guide.
10 views0 comments


Feb 14, 2024
What Compliance is Right-Sized for YOU?!?!
Compliance frameworks have become a critical component for organizations in an increasingly regulated world. With the constant changes in...
6 views0 comments


Feb 7, 2024
How ISO 42001:2023 Certification Complements Your ISO 27001:2023 Certification
Enhance your company's credentials with ISO 42001 certification. Learn how it complements ISO 27001, bolstering ethical AI governance and tr
17 views0 comments


Jan 31, 2024
ISO 42001 Certification: Embracing AI for Information Management Systems
Discover how AI technology and ISO 42001 certification can revolutionize your Information Management System. Securadin is has a 100% .
8 views0 comments


Jan 22, 2024
Shannon R. Drewicke
Discover the legacy of Shannon Drewicke, a remarkable figure in the Cyber Security world. Learn how her impact continues.
233 views1 comment


Jan 17, 2024
ISO 42001:2023 and the Analog Struggle to 'Control' AI: A Governance Model Doomed to Fail?
Unpack the controversy around ISO 42001:2023, debating if its analog model hinders AI innovation. Join the discourse on regulating AI respon
25 views0 comments


Jan 8, 2024
Live a Little, Break the Rules and Succeed in Life
Break the rules, succeed in life! Learn to navigate risks, embrace creativity, and challenge the status quo. Join us on a purposeful journey
13 views0 comments


Jan 3, 2024
How Technology is Making Us Lazy and Destroying Our Critical Thinking Skills
Dive into the complex relationship between technology and critical thinking skills.
18 views0 comments


Dec 20, 2023
Don't Get Scroogled: 10 Warning Signs of Online Shopping Scams
Protect yourself from online shopping scams! Learn the 10 warning signs to watch out for, and have a safe and merry holiday season.
5 views0 comments


Dec 13, 2023
Why You Should Change Your Passwords in Your Personal Life: Use a Passphrase!!
Discover why changing your passwords is vital for online security and how using a passphrase can be a game-changer.
10 views0 comments


Dec 6, 2023
Why Do I Need to Change My Password???? Again?!?
Explore the importance of changing your password regularly for cybersecurity. Learn how it protects against brute force attacks, prevents
9 views0 comments


Nov 29, 2023
Phishing Becomes Increasingly Sophisticated: Don't get hooked!
Learn how to protect yourself and your business as phishing becomes increasingly sophisticated.
5 views0 comments


Nov 22, 2023
The Hidden Risks of Third-Party Vendors: Managing Third-Party Vulnerabilities and Mitigating Risk
Discover the hidden risks of relying on third-party vendors in today's business world.
7 views0 comments


Nov 15, 2023
My ISO 27001 Certificate is Worthless???
Take an in-depth look at the importance of objectivity in certification bodies and how ISO 27006 addresses this issue.
10 views0 comments


Nov 8, 2023
FTC Safeguards Rule Requirements, what is it, and what do you do?
The Revised Safeguards Rule requires that your information security program meet these three objectives
6 views0 comments


Nov 1, 2023
Who is Securadin, and What Do We Do?
Securadin, experts in offering state-of-the-art cybersecurity services and consultancy to clients across various industries.
10 views0 comments


Oct 26, 2023
Cyber insurance, Think again...
Is cyber insurance the right choice for CISOs and cybersecurity professionals? Explore the pros and cons of cyber insurance, its limitations
6 views0 comments


Oct 18, 2023
A Brief History of ISO/IEC: Understanding ISO 27001 Compliance
Explore the history of ISO/IEC and dive into understanding ISO 27001 compliance, a pivotal standard for information security.
31 views0 comments


Oct 10, 2023
Is an IoT device an Asset or Vulnerability? The answer may surprise you!
Discover the critical role of encryption in securing IoT devices. Learn how encryption safeguards data privacy, prevents unauthorized access
14 views0 comments


Oct 4, 2023
What is Threat Intelligence and How Does it Get Identified in a Risk Assessment?
Discover the essential role of threat intelligence in cybersecurity. Learn how to effectively identify and analyze threat intelligence.
8 views0 comments
bottom of page