These are the Cyber Regulations you need to know!
Penetration testing is a key requirement for many regulatory frameworks i.e., ISO27001, SOC 2, PCI DSS, GDPR, or OSFI. Every compliance and audit framework, standard, or procedure has its own …
Penetration testing is a key requirement for many regulatory frameworks i.e., ISO27001, SOC 2, PCI DSS, GDPR, or OSFI. Every compliance and audit framework, standard, or procedure has its own …
Simply put, ISO 27001 is an international standard on how to manage information security for organizations. It includes requirements for establishing, implementing, maintaining and continually improving an information security management …
The Allianz Risk Barometer outlines the most important business risks for the next 12 months and beyond, based on the insight of 2,650 risk management experts from 89 countries and …
The world has become digital. Like it or not, we need to save the trees. Connectedness is driving the world to move everything online, whether it’s personal or professional, it …
The world is still learning how to adjust to the “New Normal” caused by the COVID-19 pandemic, the “Great Resignation” and shifting geo-political tensions. While North American businesses have shown …
The electricity sector is a critical infrastructure in any economy. The electrical grid throughout North America is considered as the world’s largest machine. It has been growing and evolving since …
A common question we are asked is: What is the average downtime after a Ransomware attack on my business? The average length of downtime after ransomware attacks on businesses in …
What is Cyber Insurance? Cyber insurance is a specialty insurance product intended to protect businesses from Internet-based risks, and more generally from risks relating to information technology infrastructure and activities. …
Have you noticed the topic of cyber security keeps coming around the water cooler at work? Have you been ignoring the company memos because it’s using words like Phishing, Worms, …
Penetration testing is the process of identifying security gaps and issues in your IT infrastructure by emulating the tactics, techniques and procedures of a real world attacker. A penetration test, …