.
HomeGRCInsights

GRCInsights

Emergency Preparedness Training with New Technology

Emergencies can happen at any moment. Emergencies come in many forms, I break them...

Disasters: Fat Tails and Ruin

From a risk perspective we live in two statistical worlds – one that is...

Taking a 360-Degree Approach to Managing GRC Controls

If you look at an enterprise organization today, they rely heavily on countless applications...

Bridging Network Security Gaps with Better Network Object Management

More than 80% of businesses globally now combine traditional data centers with multiple public and private...

Strategies for Data Protection in Zero Trust Architectures

I have witnessed the zero-trust transformation closely down in the trenches of Google, Mobileiron...

Cybersecurity: Origin and a Brief on Cyber Attack Lifecycle

It is in our fundamental human nature to seek out new horizons. This was...

How banks can fight money laundering with AI

If we take a step back and look at the state of financial crime,...

Manage Your Data Blindspots with Zero Trust Data Access (ZTDA)

Visibility is the first step in effectively managing cyber risk. This principle applies to...

Hot Topics