.
HomeGRCInsights

GRCInsights

The Future of Controlling Privacy and the Use of Data Assets

Introduction This article will discuss how to use modern data anonymization techniques and Synthetic Data...

The human factor, the weakest link of the chain

In the post-pandemic era the industry and institutions rely more than ever on remote...

Beating Vulnerabilities Proactively: The Evolving Paradigm of Endpoint Security

A great deal has changed over the last few years. Accelerated digitalization has significantly...

Security Assessments and Their Role Within Proactive and Reactive Cybersecurity

Like virtually every other industry over the past two years, the healthcare sector has...

How network visibility can improve a company’s cybersecurity posture

Cyber threats have now grown to be so sophisticated that they can use one...

DevSecOps – What the future holds?

I recently read an article that was themed around ‘why DevOps will cease to...

Applying Security Operations Center principles to Compliance

Per CompTIA, a Security Operations Center (SOC – pronounced “sock”) is comprised of a...

Hot Topics