Skip to content

Cybersecurity, risk and compliance news and thought leadership

Curated content for the cybersecurity, risk and compliance professional: We cover the latest on frameworks, risks, and security trends.

abstract_blog_circle_lime
 Why Joining 6clicks Marketplace is a Smart Move

As a Governance, Risk, and Compliance (GRC) vendor, finding new ways to drive revenue growth is essential. One strategy to consider is joining an online marketplace like 6clicks,..

Read More

 6clicks Expands Offering with Launch of Marketplace

6clicks fuels growth for advisors and businesses with the launch of the first global risk and compliance marketplace for technology, services, insurance, and content providers...

Read More

 What is NIST CSF 2.0?

What is NIST CSF? The NIST CSF (cybersecurity framework) is a set of guidelines for organizing and improving the cybersecurity program of an organization. It was created with the..

Read More

 An introduction to ISO/IEC 27017:2015 and information security for cloud services

What is ISO/IEC 27017:2015 ISO/IEC 27017:2015 provides organizations with the internationally accepted code of practice for infromation security controls based on ISO/IEC 27002..

Read More

 New Feature: Spoke Groups for Hubs

Unique to 6clicks is our Hub + Spoke architecture, which allows:

Read More

 An overview of Third-Party Risk Management (TPRM) frameworks

A third-party risk management framework is a set of policies, procedures, and tools that an organization uses to identify, assess, and manage the risks associated with its..

Read More

 What is third party risk assessment?

What is third party risk assessment? Third party risk assessment is a process that organizations use to identify and evaluate the potential risks associated with working with..

Read More

 What is enterprise risk management (ERM)?

Enterprise Risk Management (ERM) is a comprehensive and proactive process that organizations use to identify, assess, prioritize, and manage risks that may affect their ability to..

Read More

Risk, threat and vulnerability - what's the difference?

Understanding the distinctions between threat, vulnerability, and risk is crucial in the realm of cybersecurity.

Read More

How ISO 27001 and NIST CSF complement each other

What is ISO 27001? ISO 27001, also known as ISO/IEC 27001, is an internationally recognized standard for information security management systems (ISMS). It provides a systematic..

Read More

 7 tips for your threat & vulnerability management program

Threat actors are constantly searching for ways to exploit vulnerabilities in networks and software systems. These threats can come from both domestic and global sources and can..

Read More

 Simplifying the NIST framework for enhanced cybersecurity

What is the NIST framework for cybersecurity? The NIST Cybersecurity Framework (CSF) is a set of guidelines and recommendations developed by the National Institute of Standards..

Read More