Curated content for the risk and compliance professional: We cover the latest on cybersecurity, frameworks, risks, and compliance trends.
Delivering Hub & Spoke GRC in Distributed & Autonomous Business
Jan 1, 2023
Using Zero Trust Architecture to Balance Cyber Security Risks
Jan 3, 2023
How Can a vCISO Help Protect Your Network?
Jan 5, 2023
Who has to comply with ASD Essential 8?
What is ASD Essential 8? The Australian Signals Di...
Is NIST a standard or framework?
What is NIST? NIST, which stands for the National ...
UK Cyber Essentials
This authoritative guide provides a comprehensive overview of the UK Cyber Essentials scheme, a gove...
A hacker is an individual who uses their technical knowledge to gain unauthorized access to computer...
Compliance Automation Software
Compliance Automation Software is a type of software designed to automate the process of ensuring co...
ISO/IEC 27001 Lead Implementer
ISO/IEC 27001 Lead Implementer is an individual with the knowledge and experience to plan, manage, a...
Spear Phishing is a type of cyber attack that involves sending fraudulent emails or messages that ap...
GRC Buying Guide