Risk Management and
Cybersecurity Blog

Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?

Subscribe now

Choose compliance frameworks

Choosing a compliance framework for your business

What is a compliance framework? In the past decade, a host of data privacy regulations have been introduced to combat ...
Identifying IT security gaps

What is an IT security gap?

An IT security gap is a vulnerability that malicious actors can exploit in a company's cyber security defences. Gaps in ...
Types of cyber security controls

What are cyber security controls?

What are cyber security controls? Cybersecurity controls are the countermeasures organisations put in place to detect, reduce, prevent, or counteract ...
What is COBIT framework - the guide

What is a COBIT framework?

Control Objectives for Information and Related Technology (COBIT) is a framework created by the Information Systems Audit and Control Association ...
Technology risk management guide

What is technology risk management?

Technology risk management demands careful attention and a comprehensive plan. RiskXchange can deliver both. Almost every business today relies upon ...
Cyber security in banking

Why is cybersecurity important in banking?

Cyber security in banking is one of the most important elements in finance today. Banks are not only responsible for ...
What is cyber security risk mitigation

What is cyber security risk mitigation?

What is cyber security risk mitigation? With a cyberattack occurring worldwide every 44 seconds, companies can no longer afford to ...
What is network segmentation

What is network segmentation?

Network segmentation is an architectural approach that divides a network into smaller, distinct sub-networks - or subnets. This allows a ...

Choose compliance frameworks

Choosing a compliance framework for your business

What is a compliance framework? In the past decade, a host of data privacy regulations have been introduced to combat ...
Identifying IT security gaps

What is an IT security gap?

An IT security gap is a vulnerability that malicious actors can exploit in a company's cyber security defences. Gaps in ...
Types of cyber security controls

What are cyber security controls?

What are cyber security controls? Cybersecurity controls are the countermeasures organisations put in place to detect, reduce, prevent, or counteract ...
What is COBIT framework - the guide

What is a COBIT framework?

Control Objectives for Information and Related Technology (COBIT) is a framework created by the Information Systems Audit and Control Association ...
Technology risk management guide

What is technology risk management?

Technology risk management demands careful attention and a comprehensive plan. RiskXchange can deliver both. Almost every business today relies upon ...
Cyber security in banking

Why is cybersecurity important in banking?

Cyber security in banking is one of the most important elements in finance today. Banks are not only responsible for ...
What is cyber security risk mitigation

What is cyber security risk mitigation?

What is cyber security risk mitigation? With a cyberattack occurring worldwide every 44 seconds, companies can no longer afford to ...
What is network segmentation

What is network segmentation?

Network segmentation is an architectural approach that divides a network into smaller, distinct sub-networks - or subnets. This allows a ...