Skip to content

Cybersecurity, risk and compliance news and thought leadership

Curated content for the cybersecurity, risk and compliance professional: We cover the latest on frameworks, risks, and security trends.

abstract_blog_circle_lime
 6clicks announces new and improved metrics capability

Historically, the Metrics module in 6clicks has helped customers monitor and track key GRC activities. As a result, the module has helped drive important risk and compliance..

Read More

 Attestations enhancement: Single attestation to multiple controls

The Attestation module has had a functional uplift in the latest 6clicks product enhancement. Earlier, users would have to select each control individually for attestation. With..

Read More

 Three new reports added to Reports & Analytics

One of the objectives of 6clicks is to simplify risk and compliance processes for the platform users. With the intent to further enhance the user experience, we have released new..

Read More

 Setting the information security policy for ISO 27001

The Information Security policy is an important and mandatory document for ISO 27001 implementation. Several organisations struggle with creating a useful information security..

Read More

 Top management's key responsibilities for ISO 27001 implementation

One of the reasons why ISO implementation fails in some organizations is because the top management does not understand why the implementation is necessary and how exactly it..

Read More

 5 key questions every CEO must ask about their cyber program

The aim of cybersecurity is not to build an invincible digital fortress that cannot be breached by hackers, because it is simply not possible. No matter whether you have a small..

Read More

 Quest selects 6clicks to support their managed cyber GRC offering

Quest Technology Management, a cybersecurity advisory and managed service provider based in Roseville, CA selects 6clicks as their platform to provide digitally enabled cyber..

Read More

 Creating data stories to foster a data culture

Numbers alone are not enough to drive a data culture. For an effective data culture, you need to build stories around the data to keep everyone involved and aligned.

Read More

 Integrating your ISMS with Nessus & Qualys

Integrating your ISMS with Nessus & Qualys As many as 84% of software professionals believe that threats to the software supply chain will be the biggest concern in the next three..

Read More

 What is the common vulnerability scoring system and how does it work?

What is a Common Vulnerability Scoring System? The Common Vulnerability Scoring System (CVSS) is a standardized method used to assess and rate the severity of security..

Read More

 Understanding vulnerability management

Vulnerability management is the process of identifying, assessing, and treating cyber vulnerabilities across systems and software used in an organisation. It is an ongoing,..

Read More