Exploring Access Control, MFA and the Principle of Least Privilege

Exploring Access Control, MFA and the Principle of Least Privilege

In this blog post, we explore Access Control – a critical component of cyber risk management and something that’s pivotal to implementing a zero-trust security model. Strong access control mechanisms form a part of all security frameworks and data privacy regulations...
CIS Benchmarks: Securing Your Operating System Configuration

CIS Benchmarks: Securing Your Operating System Configuration

A poorly configured operating system can leave your organization vulnerable to a wide range of intrusions and cyber attacks, including malware infections, unauthorized access, and data breaches. By regularly assessing systems for weak configurations and adhering to...

CYRISMA users can now assess compliance with ISO/IEC 27001!

The CYRISMA GRC module now covers ISO/IEC 27001, in addition to the eight other security frameworks and regulations that were already included. The ISO/IEC 27001 is a globally recognized security standard that helps organizations establish, implement, maintain and...
Five Essential Cybersecurity Controls for SMBs

Five Essential Cybersecurity Controls for SMBs

If you’re responsible for cybersecurity at a small or midsized organization, and are unsure about what to include in your must-have list, this article is for you. The task of keeping your organization secure against cyber threats can seem overwhelming because of the...