C-Risk is dedicated sharing quality insights with our readers. Our blog articles explore a range of topics with a focus on Cyber Risk Quantification, cybersecurity, and technology in business.
CCSP: Mastering cybersecurity in the cloud
Dive into the world of cloud security certification with C-Risk's CCSP guide. You will gain a high-level overview of the six domains of cloud computing, how to prepare for the CCSP exam and the opportunities that await a certified IT professional.
CISSP: An in-demand certification for cybersecurity professionals
The CISSP is the gold standard for information security and cybersecurity professionals. Learn about its benefits, requirements, and how it boosts your career in information security.
Fundamentals of Information Security: Risk as a Foundation of Cybersecurity
Explore the foundations information security, focusing on risk-based strategies to safeguard digital assets against cyber threats in the age of SaaS, IoT, and AI.
The Sunburst supply chain attack explained
“The “Sunburst” supply chain attack impacted hundreds of businesses, and remains one of the most sophisticated and widespread cyberattacks.
FAIR™️ risk methodology: quantifying and managing cyber risk
How is the FAIR™️ methodology different from other cyber risk analysis methods? What is its governing principle? How can you benefit from this standard?
DRP: all you need to know about the IT recovery plan
What is the IT DRP? How do you set it up to ensure disaster recovery in the event of a computer failure or a cyberattack?
The paramount importance of Third-Party Risk Management in cybersecurity
The more business partners an extended enterprise has, the greater the need is to think about third-party cybersecurity risk management.
GDPR compliance and its impact on your cybersecurity strategy
Being compliant with GDPR and having efficient data protection policy is a tricky challenge that can be overcome with Cyber Risk Quantification (CRQ).
Is Cloud Computing a Risk?
The Cloud & Your Digital Assets: CRQ Methods for Risk Management
ISO 27001: a lever for your cybersecurity strategy?
By improving the security of sensitive information, ISO 27001 contributes to your cybersecurity strategy. Definition, operation and benefits.
NIST Cybersecurity Framework: how to manage your cyber risks?
Is the NIST Cybersecurity Framework good at analysing, preventing, and recovering from cyber a cyber incident? How can you use this method? Is it enough to protect your structure?
Understanding malware and mitigating cyber risk in 2021
Malware is a cyber attack that causes unauthorized and harmful actions on your device or system. Learn about malicious software to perfect your cyber security.
What is a DDoS attack? How can you protect yourself or your organization?
A DDoS attack will disrupt web traffic and make services unavailable. Learn how they work and how to protect your digital assets, services and operations.
What should your crisis management process be for a cyberattack?
How to apply the traditional crisis management procedure to a cyber attack? What specificities should you consider? What are the tools at your disposal?
Ransomware: Understanding and Protecting Yourself from Ransomware
Ransomware poses the biggest cyber threat to businesses in 2021. How does it work? How to protect yourself from it?
How to prevent and avoid a phishing attack?
Corporate phishing attempts are becoming more and more sophisticated, threatening the integrity of sensitive data. Here is all you need to know to make sure you are well protected!
What is a Man-in-the-Middle Attack (MITM)? How to be protected ?
MITM cyberattack: What Is It? How does it work ? How can you easily prevent it?
Risk management: how to prevent cyberattacks?
Cyber risk management means looking into the different definitions of risk as well as the resulting management methods.
How to create a cyber security risk map?
What is risk mapping? What methods should you follow to make it useful? Whom should you involve in the process? How can you adapt it to cyber risks?
How to manage crisis communication after a cyber attack
How to prepare your crisis communication in the event of a cyberattack. From the communication cycle to priority targets and messages: the complete guide.
How to set up a crisis response team after a cyberattack?
Procedures you should follow to create a crisis response team to anticipate and respond to cyberattacks
Cyber attacks: how to identify them and protect yourself effectively?
Cyberattacks are malicious attempts to harm a defined target. Find out how to protect your business against cybercrime in 2022.
A guide to the EBIOS methodology: definition, procedure, limitations
What is the EBIOS cyber risk analysis method? Which structures can make use of it? What are its benefits and drawbacks?
For a lot of industries, Business Continuity (BCP) and Disaster Recovery (DR) is a requirement; however, a lot of the time the programs are minimalistic in nature.