C-Risk is dedicated sharing quality insights with our readers. Our blog articles explore a range of topics with a focus on Cyber Risk Quantification, cybersecurity, and technology in business.
Protecting health data: challenges and solutions in cybersecurity
The healthcare sector is a major target for cybercriminals. And with the rise in cyberattacks, strong health data protection strategies are critical.
Melissa Parsons
Follow us:
DORA: mitigating ICT risks and strengthening digital resilience
Gain insights into the EU's Digital Operational Resilience Act: its implications for financial entities, challenges for compliance and achieving digital operational resilience.
Industry 4.0: the challenges of industrial cybersecurity
Discover the core technologies driving Industry 4.0 and understand the operational cybersecurity challenges they bring.
CCSP: Mastering cybersecurity in the cloud
Dive into the world of cloud security certification with C-Risk's CCSP guide. You will gain a high-level overview of the six domains of cloud computing, how to prepare for the CCSP exam and the opportunities that await a certified IT professional.
CISSP: An in-demand certification for cybersecurity professionals
The CISSP is the gold standard for information security and cybersecurity professionals. Learn about its benefits, requirements, and how it boosts your career in information security.
Fundamentals of Information Security: Risk as a Foundation of Cybersecurity
Explore the foundations information security, focusing on risk-based strategies to safeguard digital assets against cyber threats in the age of SaaS, IoT, and AI.
Cybersecurity in 2023: mitigating risk with good governance
Cybersecurity and information security risk management empowers organizations to make defensible decisions and build cyber resilience.
The Sunburst supply chain attack explained
Discover how “The “Sunburst” supply chain attack impacted hundreds of businesses, and remains one of the most sophisticated and widespread cyberattacks.
Christophe Forêt
FAIR™️ risk methodology: quantifying and managing cyber risk
How is the FAIR™️ methodology different from other cyber risk analysis methods? What is its governing principle? How can you benefit from this standard?
DRP: all you need to know about the IT recovery plan
Learn all you need to know to set up a disaster recovery plan and to ensure it in the event of a computer failure or a cyberattack.
The paramount importance of Third-Party Risk Management in cybersecurity
The more business partners an extended enterprise has, the greater the need is to think about third-party cybersecurity risk management.
Lydie Aubert
GDPR compliance and its impact on your cybersecurity strategy
Being compliant with GDPR and having efficient data protection policy is a tricky challenge that can be overcome with Cyber Risk Quantification (CRQ).
Is Cloud Computing a Risk?
The Cloud & Your Digital Assets: CRQ Methods for Risk Management
ISO 27001: a lever for your cybersecurity strategy?
By improving the security of sensitive information, ISO 27001 contributes to your cybersecurity strategy. Definition, operation and benefits.
NIST Cybersecurity Framework: how to manage your cyber risks?
Is the NIST Cybersecurity Framework good at analysing, preventing, and recovering from cyber a cyber incident? How can you use this method? Is it enough to protect your structure?
Understanding malware and mitigating cyber risk
Learn all you need to know about malicious software to perfect your cyber security.
What is a DDoS attack? How can you protect yourself or your organization?
A DDoS attack will disrupt web traffic and make services unavailable. Learn how they work and how to protect your digital assets, services and operations.
Élodie Huet
What should your crisis management process be for a cyberattack?
How to apply the traditional crisis management procedure to a cyber attack? What specificities should you consider? What are the tools at your disposal?
Ransomware: Understanding and Protecting Yourself from Ransomware
Ransomware poses the biggest cyber threat to businesses in 2021. How does it work? How to protect yourself from it?
Simon Park
How to prevent and avoid a phishing attack?
Corporate phishing attempts are becoming more and more sophisticated, threatening the integrity of sensitive data. Here is all you need to know to make sure you are well protected!
What is a Man-in-the-Middle Attack (MITM)? How to be protected ?
MITM cyberattack: What Is It? How does it work ? How can you easily prevent it?
Léa Goichon
Risk management: how to prevent cyberattacks?
Cyber risk management means looking into the different definitions of risk as well as the resulting management methods.
How to create a cyber security risk map?
What is risk mapping? What methods should you follow to make it useful? Whom should you involve in the process? How can you adapt it to cyber risks?
How to manage crisis communication after a cyber attack
How to prepare your crisis communication in the event of a cyberattack. From the communication cycle to priority targets and messages: the complete guide.
How to set up a crisis response team after a cyberattack?
Procedures you should follow to create a crisis response team to anticipate and respond to cyberattacks