Risk Management and
Cybersecurity Blog

Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?

Subscribe now

Types of cyber security controls

What are cyber security controls?

What are cyber security controls? Cybersecurity controls are the countermeasures organisations put in place to detect, reduce, prevent, or counteract ...
Read More
What is COBIT framework - the guide

What is a COBIT framework?

Control Objectives for Information and Related Technology (COBIT) is a framework created by the Information Systems Audit and Control Association ...
Read More
Technology risk management guide

What is technology risk management?

Technology risk management demands careful attention and a comprehensive plan. RiskXchange can deliver both. Almost every business today relies upon ...
Read More
Cyber security in banking

Why is cybersecurity important in banking?

Cyber security in banking is one of the most important elements in finance today. Banks are not only responsible for ...
Read More
What is cyber security risk mitigation

What is cyber security risk mitigation?

What is cyber security risk mitigation? With a cyberattack occurring worldwide every 44 seconds, companies can no longer afford to ...
Read More
What is network segmentation

What is network segmentation?

Network segmentation is an architectural approach that divides a network into smaller, distinct sub-networks - or subnets. This allows a ...
Read More
What are information security standards

What are information security standards? 

An information security standard is a series of documented processes that define how to implement, manage, and monitor various security controls. As ...
Read More
What are open ports

What are open ports?

Ports are a fundamental part of the internet's communication model. All communication on the internet is exchanged via ports. Every ...
Read More

Types of cyber security controls

What are cyber security controls?

What are cyber security controls? Cybersecurity controls are the countermeasures organisations put in place to detect, reduce, prevent, or counteract ...
Read More
What is COBIT framework - the guide

What is a COBIT framework?

Control Objectives for Information and Related Technology (COBIT) is a framework created by the Information Systems Audit and Control Association ...
Read More
Technology risk management guide

What is technology risk management?

Technology risk management demands careful attention and a comprehensive plan. RiskXchange can deliver both. Almost every business today relies upon ...
Read More
Cyber security in banking

Why is cybersecurity important in banking?

Cyber security in banking is one of the most important elements in finance today. Banks are not only responsible for ...
Read More
What is cyber security risk mitigation

What is cyber security risk mitigation?

What is cyber security risk mitigation? With a cyberattack occurring worldwide every 44 seconds, companies can no longer afford to ...
Read More
What is network segmentation

What is network segmentation?

Network segmentation is an architectural approach that divides a network into smaller, distinct sub-networks - or subnets. This allows a ...
Read More
What are information security standards

What are information security standards? 

An information security standard is a series of documented processes that define how to implement, manage, and monitor various security controls. As ...
Read More
What are open ports

What are open ports?

Ports are a fundamental part of the internet's communication model. All communication on the internet is exchanged via ports. Every ...
Read More