SOC 2 compliance: Everything your organization needs to know
Learn about SOC 2 compliance, how it differs from SOC 1 and SOC 3, and how to prepare for an SOC 2 audit.
Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master’s degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security.