<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>TACSOP Blog</title>
    <link>https://tacsop.io/blog/index.html</link>
    <description>Plain-language writing on cyber insurance, customer questionnaires, state safe harbor statutes, audit preparation, and the compliance documentation that goes with each. From the team at Foxtrot 7 Tech.</description>
    <language>en-us</language>
    <copyright>Copyright Foxtrot 7 Tech</copyright>
    <lastBuildDate>Fri, 01 May 2026 12:00:00 +0000</lastBuildDate>
    <atom:link href="https://tacsop.io/blog/rss.xml" rel="self" type="application/rss+xml" />
    <image>
      <url>https://tacsop.io/assets/tacsop-icon-128.svg</url>
      <title>TACSOP Blog</title>
      <link>https://tacsop.io/blog/index.html</link>
    </image>

    <item>
      <title>What your cyber insurance application is actually asking.</title>
      <link>https://tacsop.io/blog/cyber-insurance-applications.html</link>
      <guid isPermaLink="true">https://tacsop.io/blog/cyber-insurance-applications.html</guid>
      <pubDate>Fri, 01 May 2026 12:00:00 +0000</pubDate>
      <dc:creator>Foxtrot 7 Tech</dc:creator>
      <description>Cyber insurance applications fall into three categories of questions. A walk-through of technical, process, and governance controls and what a credible answer looks like.</description>
    </item>

    <item>
      <title>How to respond to a customer security questionnaire (SIG, CAIQ, or custom).</title>
      <link>https://tacsop.io/blog/customer-security-questionnaires.html</link>
      <guid isPermaLink="true">https://tacsop.io/blog/customer-security-questionnaires.html</guid>
      <pubDate>Fri, 01 May 2026 12:00:00 +0000</pubDate>
      <dc:creator>Foxtrot 7 Tech</dc:creator>
      <description>A walk-through of SIG, CAIQ, and custom security questionnaires. What each one is testing for and how to build a reusable response file you populate once.</description>
    </item>

    <item>
      <title>State safe harbor statutes for cybersecurity: what they offer and how to qualify.</title>
      <link>https://tacsop.io/blog/state-safe-harbor-statutes.html</link>
      <guid isPermaLink="true">https://tacsop.io/blog/state-safe-harbor-statutes.html</guid>
      <pubDate>Fri, 01 May 2026 12:00:00 +0000</pubDate>
      <dc:creator>Foxtrot 7 Tech</dc:creator>
      <description>Texas, Connecticut, Ohio, and Utah each offer cybersecurity safe harbor protection. A walk-through of what each statute offers, who qualifies, and how to document it.</description>
    </item>

    <item>
      <title>How to prepare for a security audit, regulator review, or board cybersecurity question.</title>
      <link>https://tacsop.io/blog/audit-and-scrutiny-preparation.html</link>
      <guid isPermaLink="true">https://tacsop.io/blog/audit-and-scrutiny-preparation.html</guid>
      <pubDate>Fri, 01 May 2026 12:00:00 +0000</pubDate>
      <dc:creator>Foxtrot 7 Tech</dc:creator>
      <description>Customer audits, FTC Safeguards Rule reviews, ABA professional responsibility reviews, and board cybersecurity questions all ask the same question: what can you produce?</description>
    </item>

  </channel>
</rss>
