Dissecting a Cyber Attack With a Perspective on Compliance

Dissecting a Cyber Attack With a Perspective on Compliance

A website breach We recently came across an interesting case with one of our **EAP (Early Access ...

Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices

Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices

A Silent Threat in the Healing Environment Hospitals, dedicated to healing, face a hidden risk a ...

SlopSquatting- A New Dimension to Supply-Chain Attacks

SlopSquatting- A New Dimension to Supply-Chain Attacks

Supply chain has been a prominent threat vector used in cyber-attacks. From the infamous SolarWinds ...

MITRE CVE - Is Your GRC Ready for a World Without a Stable CVE?

MITRE CVE - Is Your GRC Ready for a World Without a Stable CVE?

A Close Call for the Cybersecurity Industry Last week, the cybersecurity industry faced a huge r ...

Policy Management: From Wishlist to Reality with CISOGenie

Policy Management: From Wishlist to Reality with CISOGenie

In today’s complex regulatory landscape, robust IT policies are the bedrock of a secure and complian ...

CISOGenie: Ushering in the Era of SaaS 4.0 for GRC

CISOGenie: Ushering in the Era of SaaS 4.0 for GRC

The Software as a Service (SaaS) model has be ...