Blog
Eight Data Protection Questions to Ask to Assess Cyber Risk
Eight crucial questions you need to ask about your data protection practices in an era when remote work is becoming the norm and sensitive data is dispersed across computing environments and geographies.
Ransomware Prevention Best Practices
Learn how to minimize the risk of ransomware and mitigate the impact of an attack if your organization is targeted. Leverage CYRISMA’s powerful features to implement essential ransomware prevention controls.
Hardware and Software Asset Inventories: Why they Matter
Learn why maintaining detailed inventories of hardware and software assets is critical to effective cyber risk management. Understand your assets to proactively manage risk and protect sensitive data.
Keeping Common Cyber Threats at Bay
Organizations can keep common cyber threats at bay by focusing on essential cybersecurity controls and getting the basics right before moving on to more complex detection strategies.
NIST CSF 2.0 – The New Govern Function
The NIST Cybersecurity Framework (CSF) version 2.0 adds a new Govern function to the CSF core. The new function includes action categories for establishing and monitoring cyber risk strategy, expectations, and policy and helps align cyber risk with overall enterprise risk.
Australia’s Essential Eight and the UK’s Cyber Essentials – An Overview
Read our overview of Australia’s Essential Eight Strategies and the UK’s Cyber Essentials scheme, how these frameworks help organizations guard against a wide range of cyber threats, and how to move closer to compliance.
Understanding CVSS and What’s New in Version 4.0
Version 4.0 of CVSS, published on November 1, 2023, introduces finer granularity into the system, enabling CVSS users to assess risk based on a wider set of factors – many of which are specific to the user environment.
CYRISMA Introduces Industry Comparison Capability
CYRISMA this week added the much-awaited Industry Comparison feature to the platform which will enable users to compare their cyber risk management performance against that of their peers within the same industry.
Cyber Risk Management in a New Digital Landscape
To manage cyber risk effectively take a holistic view of your digital environment, assess cyber threats in a wider context, and take a data-centric approach to cybersecurity – our concluding post for Cybersecurity Awareness Month
Beyond Vulnerability Management: Managing Cyber Risk Holistically
Organizations today need to go beyond vulnerability management to stay safe. In this post, we explore how IT & security leaders can expand the scope of their cyber risk assessment for all-round risk reduction.