Blog
Understanding Internal and External Vulnerability Scans
This guide explores internal & external vulnerability scans, detailing what they are, when to use them & best practices for conducting them.
Common CVE Types – What they mean and how they can impact your business
What are some common vulnerability descriptors and types, and how can they impact your organization? From RCEs to buffer overflows – learn about some common CVE types in our latest blog post.
What’s new in the CIS Critical Controls Version 8.1?
What’s new in the CIS Controls v8.1? A new Governance security function, new asset classes including the Documentation asset type, enhanced clarity and alignment with NIST CSF 2.0.
Reducing Cyber Risk in the Healthcare Sector
In this post, we examine both the roadblocks to reducing cyber risk in the healthcare sector, and some effective ways for healthcare entities to build cyber resilience and improve preparedness.
Cybersecurity as an Enabler of Digital Innovation and Growth
Cybersecurity is increasingly being seen as an enabler of secure digital innovation rather than a hindrance to quick growth, with security embedded within the foundation of new digital strategies.
Evolving Data Governance Practices in the Age of Generative AI
What’s good data governance in the age of GenAI? Know where your sensitive data is. Classify the data. Develop policies to manage the data accessed and generated by GenAI.
Verizon DBIR Highlight: The Need for Faster Patching & Proactive Security
According to Verizon’s 2024 DBIR, most organizations are still too slow to patch critical vulnerabilities, giving threat actors a comfortable window to exploit security gaps.
Adopting a Data-Centric Approach to Cybersecurity
In this post, we talk about adopting a data-centric approach to cybersecurity. Discover, inventory, classify, protect, and monitor sensitive data for optimal protection.
Why You Must Quantify the Financial Impact of Cyber Risk
Quantifying the financial impact of cyber risk reflects a broader trend where cybersecurity is seen as a vital business concern. In this blog post, we talk about how assigning a monetary value to cyber risk helps improve security outcomes.
Zero Trust Security: The Data Pillar
In this blog post, we explore the data pillar of zero trust security, and how the CYRISMA platform enables you to implement zero trust security controls such as sensitive data discovery, classification, and encryption.