Blog
How to get the Best ROI for Your SIEM?
So, you have a purchased a SIEM (Security Information and Event Management) solution. Now that you have made the investment, the time has come to
Why Cyber Security Needs to be Built-in to Every Business Process
Cyber attacks are growing every year. There are all kinds of stats out there to verify this: 78% of organizations worldwide were hacked in 2019.
Breached! A Cautionary Tale You Need to Re-Read
In 2015 Dave Millier released his first novel, Breached! A Cautionary Tale of Cybersecurity and Intrigue. If you haven’t heard of it, Breached! is the
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Global Privacy Laws: What They Have Been and Where They Will go
People are growing more and more concerned over the use of their personal data by companies online. And they should be. Breaches of personal data
What is MGRC and Why You Need it?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
Yesterday was Data Privacy Day: How did you Celebrate?
Also know as Data Protection Day in Europe, Data Privacy day has been observed on January 28th since 2007. According to Wikipedia, The day is
How your Compliance and Cyber Security Efforts can Bolster Revenue Growth
You already know that a breach can cripple your business. A breach can negatively affect your business not just in the cost of dollars spent
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)