Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.
Delivering Hub & Spoke GRC in Distributed & Autonomous Business
Jan 1, 2023
Using Zero Trust Architecture to Balance Cyber Security Risks
Jan 3, 2023
How Can a vCISO Help Protect Your Network?
Jan 5, 2023
Who has to comply with ASD Essential 8?
What is ASD Essential 8? The Australian Signals Di...
Is NIST a standard or framework?
What is NIST? NIST, which stands for the National ...
Discretionary Access Control (DAC)
Discretionary Access Control (DAC) is a type of access control in which a user's access to a system ...
Remediation is the process of addressing a problem, issue, or deficiency in order to restore a syste...
Cybersecurity Incident Report
A Cybersecurity Incident Report is an official document that is used to document the details of a cy...
NIS Directive is a directive issued by the European Union (EU) in 2018 which aims to improve the sec...
An incident is an event or occurrence that is not part of the normal operation of a system or organi...
GRC Buying Guide