Skip to content

Articles by Heather Buker

Check out Heather's LinkedIn profile here or full biography here.

abstract_blog_circle_lime
 The paradigm shift continues: Understanding cognitive GRC

Governance, Risk Management, and Compliance, or GRC as it is commonly referred to, is a term coined almost 20 years ago by research analyst firm Forrester. But until recently,..

Read More

 6clicks launches GRC evaluation guide for advisors and MSPs

6clicks has developed the most comprehensive guide and checklist to help advisors and MSPs evaluate the available GRC software solutions. This guide is designed to help you choose..

Read More

 Addressing the cybersecurity and GRC gaps for organizations

GRC implementations are on the rise with the global GRC market projected to reach USD 1881.9 million by 2028. But even as more and more businesses attempt to implement GRC, are..

Read More

 Why is data storytelling effective?

Data is important, but is it enough in itself? Data gets value when it is used effectively. Data storytelling is an effective way to explain data-led concepts and get data-backed..

Read More

 Hub & Spoke: Enabling multi-tenant GRC programs and GRCaaS

Effective GRC is an essential part of running a business. Yet, running an enterprise-level GRC program is a complex and challenging task that many organisations struggle with...

Read More

 GRC for MSPs: How to leverage the 6clicks platform?

Security and compliance go hand in hand in today’s world. You can no longer focus on one and hope that the other automatically aligns. This is why the number of companies looking..

Read More

 Powerful automation for scalable and future-ready MSPs

Managing GRC is complex, which is why many organisations outsource GRC management to Managed Service Providers (MSPs). But even for MSPs, managing GRCs for multiple clients is no..

Read More

 Setting the information security policy for ISO 27001

The Information Security policy is an important and mandatory document for ISO 27001 implementation. Several organisations struggle with creating a useful information security..

Read More

 Creating data stories to foster a data culture

Numbers alone are not enough to drive a data culture. For an effective data culture, you need to build stories around the data to keep everyone involved and aligned.

Read More

 Integrating your ISMS with Nessus & Qualys

Integrating your ISMS with Nessus & Qualys As many as 84% of software professionals believe that threats to the software supply chain will be the biggest concern in the next three..

Read More

 What is the common vulnerability scoring system and how does it work?

What is a Common Vulnerability Scoring System? The Common Vulnerability Scoring System (CVSS) is a standardized method used to assess and rate the severity of security..

Read More