The world is changing and a business’s success becomes more dependent on their CISO’s ability to not only provide IT security but IT-related compliance and risk management as well. We often hear from cyber security people that compliance isn’t security. That is true, but we believe that regulatory and standards compliance is a good starting point. Our platform uses a new paradigm that we call “policy as code,” or “executable policies,” as a way to achieve holistic, measurable security by design. In our Resource Center we will try to share, elaborate, explain, and discuss our thoughts, analyses, and innovative thinking regarding the challenges of cybersecurity as we see it.
Blog Latest posts
Airspace Vulnerabilities in Healthcare
Wireless adoption is quickly emerging in every industry vertical that is using digitalization to simplify operations. The issue is that from a security perspective, the…
Why Should You Care about Cyber Threat and Risk Assessment?
Cyber risks are evolving fast and organizations need to deal with them in more efficient ways. This requires an all-inclusive and agile approach to identifying…
Risk Based Vulnerability Management
Cyber defense is moving to a risk management and operations paradigm (see previous posts on effective cyber risk management and policy based cyber risk management).…
Latest White papers