.
HomeGRCInsights

GRCInsights

The Road to Continuous Compliance

Organizations are struggling to keep up with the ever-changing regulatory landscape. Coupling these new...

Why point solutions in Cloud Security do not effectively protect against a data breach, but a Holistic security posture can

A holistic approach to securing your cloud solutions prevents cyber-attacks more effectively than point...

Offboarding Employees in the time of Covid

When the Covid pandemic hit, IT teams had to enable employees work from home...

The necessary journey toward Zero Trust

Much attention is now being directed towards to concept of Zero Trust.  A quick...

Identity and Access Management By: Michael Shew

Identity and access management is a structure of business processes, policies, and technologies that...

Critical Infrastructure Protection Cybersecurity next year or beyond Blog

The increasing frequency and sophistication of successful Operational Technology (OT) cyber-attacks serve as a...

The Regulatory Tsunami About to Engulf IoT

The telecoms industry has always been highly regulated. However, the introduction of 5G ushering...

Risk Management on The Edge

The next decade or so of innovation in Computing and Information Technology will once...

SASE Slicing

The Call Contribute to Network Slice as a Service with SASE, help The MEF Forum...

Are we heading for a security diSaaSter?

Industry analysts predict the SaaS market will grow by 20% YoY, and reach an...

Hot Topics