Third party security risk requires effective and efficient management. Read how you can achieve that with GRC automation.
Read MoreBlog
How to Scope PCI Compliance in a Few Easy Steps
Determining how to scope PCI compliance can make the difference between an easy audit and a complex audit. Learn the steps to determining your scope here.
Read MoreCybersecurity Management and GRC Automation
As wave after wave of cyberattacks threatens international security, cybersecurity management becomes more pressing. Although it has always been on business’s radar, the recent barrage brings the impact of cyberattacks... Read More
Compensating Controls: What You Need to Know
Compensating controls are ways to meet security requirements in the short term. But what do you really need to know to stay compliance?
Read MoreWednesday’s Women in Infosec: Kristina Birk
This month's profiled woman in information security is Kristina Birk. Ms. Birk has been working with technology since 19*cough-cough*, spending the bulk of her career in IT operations and architecture. After... Read More