Skip to content

Articles by Heather Buker

Check out Heather's LinkedIn profile here or full biography here.

abstract_blog_circle_lime
 The risk based vulnerability management approach

What is risk based vulnerability management? Risk-based vulnerability management is an approach to identifying, evaluating, and prioritizing vulnerabilities in a system or network..

Read More

 Risk identification: A key step in risk management

Risk identification helps project managers and organizations identify potential risks that may impact the success of a project or the overall business. By identifying these risks,..

Read More

 Understanding cybersecurity risk management

What is cybersecurity risk management? Cybersecurity risk management is a crucial procedure that revolves around recognizing, evaluating, and addressing potential risks to an..

Read More

 A brief overview of ASD Essential Eight

The ASD Essential Eight strategies are used by organisations to improve their cybersecurity posture. Here are some common questions about the cybersecurity framework. What is ASD..

Read More

 How to choose vendor risk management software?

Vendor risk management is the process of identifying, assessing, and mitigating the risks associated with using third-party vendors. It involves conducting due diligence on..

Read More

 What is vendor risk assessment and why is it important?

According to a Ponemon report, 51% of organisations have experienced a data breach due to the involvement of a third-party entity. Vendor risk assessment is a key step in..

Read More

 What is risk management: A brief guide

Risk management is a fundamental practice that organizations employ to identify, assess, and mitigate potential threats that may hinder their ability to achieve objectives..

Read More

 What is GRC? A brief look into Governance, Risk, and Compliance

Governance, Risk and Compliance (GRC) helps align IT activities, risk management, and compliance with governance processes to achieve business goals.

Read More

 Achieve PCI DSS compliance in 6 steps with 6clicks

If your business handles credit card payments, PCI DSS compliance is crucial. Discover everything you need to know about complying with the Payment Card Industry Data Security..

Read More

 NIST cybersecurity framework: Frequently asked questions answered!

Every business today faces threat from cybercrime. Protecting the business and its assets from security threats in the digital world is fast becoming one of the top priorities...

Read More

 Announcing the next-generation reporting and analytics suite

At 6clicks, we are dedicated to innovation and automation. We mean sleep is for the weak type d-e-d-i-c-a-t-e-d. Thanks to the brilliant minds at 6clicks and our AI engine,..

Read More

 Preparing for the age of cognitive GRC

The world has witnessed an accelerated digital transformation over the last few years. Yet, surprisingly, GRC technology adoption has been slow. Even as we talk about AI and ML..

Read More