WEST COAST MAILING ADDRESS
1 Sansome St.
35th Floor
San Francisco, CA 94104
CORPORATE & MIDWEST REGIONAL ADDRESS
4235 Hillsboro Pike
Suite 300
Nashville, TN 37215


NORTHEAST REGIONAL ADDRESS
200 Park Avenue
Suite 1700
New York, NY 10166
SOUTHEAST REGIONAL ADDRESS
1228 East 7th Ave.
Suite 200
Tampa, FL 33605
Mailing Address
11755 Wilshire Blvd.
Suite 1250
Los Angeles, CA 90025
11755 Wilshire Blvd.
Suite 1250
Los Angeles, CA 90025
3838 Oak Lawn Avenue
Suite 100
Dallas, TX 75219
Suite 100
Dallas, TX 75219
235 Peachtree ST NE
Suite 400
Atlanta, GA 30303
Suite 400
Atlanta, GA 30303
10411 Motor City Drive
Suite 750
Bethesda, MD 20817
Suite 750
Bethesda, MD 20817
6040 California Avenue SW
Suite C
Seattle, WA 98136
Suite C
Seattle, WA 98136
200 West Madison
Suite 2100
Chicago, IL 60606
Suite 2100
Chicago, IL 60606
All Rights Reserved
© 2021 KirkpatrickPrice
Popular Blog Posts
- Compliance Terms Glossary
- Purpose of Policies & Procedures
- SOC 1 vs. SOC 2
- Finding a QSA for PCI Audits
- Guide to 7 Types of Penetration Tests
- CCPA vs. GDPR
What is a Cloud Access Security Broker (CASB)?
/in Blog, Cloud Security /by Hannah Grace HolladayA cloud access security broker (CASB) is a software security service that acts as an intermediary between business cloud users and cloud providers. CASBs monitor data flow to and from cloud platforms, ensuring that cloud use comply with information security policies and regulations. Much as a firewall enables businesses to enforce security policies for incoming […]
DDoS Protection: How to Survive a Distributed Denial of Service Attack
/in Blog, Cybersecurity /by Hannah Grace HolladayYou’re sitting at your desk when the first notification arrives. Uptime monitoring has detected unusually long response times for the servers hosting the business’s primary web app. Soon after, your manager calls to say customer support is getting complaints—many users can’t sign in and the app is slow for those who can. You try to […]
How to Create a Positive Information Security Culture for Your Workplace
/in Blog, Information Security /by Hannah Grace HolladayWhat are the most significant security risks facing your organization? Your answer might include common external threats, such as brute force attacks, phishing attacks, ransomware, supply chain attacks, and attacks against vulnerable software, among many others. But the focus on external security risks misses an important point: External attacks often exploit vulnerabilities created by poor […]
Protecting Your AWS Cloud Infrastructure with AWS Network Firewall
/in Blog /by Hannah Grace HolladayAWS Network Firewall is a flexible managed firewall and intrusion detection service. It allows AWS users to control network access to resources within an AWS Virtual Private Cloud (VPC). We explored AWS Network Firewall and how it complements other AWS firewalls in What is AWS Network Firewall? In this article, we’ll dig a little deeper […]
What is AWS Network Firewall?
/in Blog /by Hannah Grace HolladayFirewalls are among the most useful information security and compliance tools. Their role is to monitor traffic moving between network borders to determine whether it should be allowed to pass. Among other responsibilities, firewalls prevent unauthorized access to networks on which sensitive data is stored, making them an essential tool for businesses seeking to comply […]