Open in app
Home
Notifications
Lists
Stories

Write
Mike Arhangelsky
Mike Arhangelsky

Home

May 9

Cybersecurity at the Edge: OT vs. IT

No one questions the need for cybersecurity these days. With attacks coming on a daily basis, the question today is “how do I secure” rather than “why should I secure” or “do I need to secure at all.” What’s less understood is the difference between securing at the OT (operational technology) level versus securing at the IT (informational technology) level. First, lets the define the two terms. Essentially, IT is responsible for managing the flow of information (data), while OT deals with the computers or other machinery that…

Cybersecurity

4 min read

Cybersecurity at the Edge: OT vs. IT
Cybersecurity at the Edge: OT vs. IT

Nov 17, 2021

Reckless Driving and How to Reduce Points: Texas, Florida and New Jersey

So, you’ve been caught reckless driving and now you need to do damage control. The good news is that you’ve come to the right place. If you’ve found yourself on the wrong side of the law, we can help. With Comedy Defensive Driving, you can simply sign up and complete the best defensive driving course around without even leaving your favorite armchair. …

Reckless Driving

4 min read

Reckless Driving and How to Reduce Points: Texas, Florida and New Jersey
Reckless Driving and How to Reduce Points: Texas, Florida and New Jersey

Sep 23, 2021

Why a Court Requires You to Take a Driver Improvement Course

Having to take a court-ordered driving course may seem like a big deal. As part of the fallout from your traffic violation, being sent by a judge to attend traffic school may feel like more drama and punishment than you need right now. Rest assured, with Comedy Defensive Driving at…

Driver Safety

3 min read

Why a Court Requires You to Take a Driver Improvement Course
Why a Court Requires You to Take a Driver Improvement Course

Sep 23, 2021

SOC 2 vs. SOC 3 Reports: How do they differ?

As companies increasingly leverage the cloud to store customer data, SOC 2 compliance is becoming a necessity for a wide variety of organizations. But what exactly is a SOC 2 report and how do these compare to SOC 3 reports? In the following blog, we’ll be diving into the differences…

Soc Report

4 min read

SOC 2 vs. SOC 3 Reports: How do they differ?
SOC 2 vs. SOC 3 Reports: How do they differ?

Aug 20, 2021

Demystifying Cloud Computing

Cloud and Cloud Computing are common terms, but they are ethereal. What exactly is “the Cloud”? What benefits does it offer? This blog explores why the Cloud has become an important part of the industrial landscape. The origins of the term ‘the Cloud’ to describe servers that are accessed over…

Cloud Computing Services

4 min read

Demystifying Cloud Computing
Demystifying Cloud Computing

Jun 11, 2021

Lessons Learned from the Colonial Pipeline Attack

Lessons Learned from the Colonial Pipeline Attack June 9, 2021 Cybersecurity attacks that affect our daily lives serve as massive wake-up calls to improve our IoT and Operational Technology (OT) security. The recent cyberattack on the Colonial Pipeline disrupted oil and gas distribution along the East Coast of the U.S., causing gas shortages and higher prices, and…

Pipelines Attack

2 min read

Lessons Learned from the Colonial Pipeline Attack
Lessons Learned from the Colonial Pipeline Attack

May 18, 2021

How to Prepare for an Audit: Your Ultimate Guide

The auditing process is designed to carefully examine your company’s financial records and make sure they’re accurate and honest. Usually, that means going over your business records with a fine-tooth comb. Unsurprisingly, preparing for an audit can often be a stressful experience, one that leaves your company dreading the end…

Auditing

13 min read

How to Prepare for an Audit: Your Ultimate Guide
How to Prepare for an Audit: Your Ultimate Guide

May 17, 2021

TPM 2.0-Compliant COM Modules Answer Call for Cybersecurity Upgrades

As more computational power is required at the Edge, embedded systems are often required to adapt for additional functionality, together with extensive connectivity and sensor inputs for the expanding Industrial Internet of Things (IIoT). The Cybersecurity Improvement Act (2020) defines the minimum security requirements for IoT devices and vulnerability disclosures…

Com Modules

3 min read

TPM 2.0-Compliant COM Modules Answer Call for Cybersecurity Upgrades
TPM 2.0-Compliant COM Modules Answer Call for Cybersecurity Upgrades

Apr 27, 2021

Choose the Best xPU Combination for Edge AI Computations

In our last blog, Which xPU? Understand the Differences Between Edge-Based Processors, we went through the different types of processing elements that might show up on an Edge computer, along with a description of each of the function types. This list included CPUs (central processing units), GPUs (graphical processing units)…

Xpu

4 min read

Choose the Best xPU Combination for Edge AI Computations
Choose the Best xPU Combination for Edge AI Computations

Feb 11, 2021

Three Types of IPE and IPE Risks: A Controller’s Guide

February 10, 2021 By Jonathan Bayeff, Holtzman “Information produced by the entity” (IPE) is any information that is produced internally by the company being audited and provided as audit evidence, whether for use in the execution of internal controls or for substantive audit procedures performed by an external auditor. In this article, we will discuss the three types of IPE you are most likely to encounter, and the level of documentation and assurance each of them requires. IPE that is subject to Information Technology General Controls (ITGCs) does not typically require as high a level of assurance as an IPE that is not subject to ITGCS. Let’s take a closer look at the three types of IPE, from most to least risky.

Financial Services

3 min read

Three Types of IPE and IPE Risks: A Controller’s Guide
Three Types of IPE and IPE Risks: A Controller’s Guide
Mike Arhangelsky

Mike Arhangelsky

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable