MediumRisk offers management software for projects and organizations. It can help create a risk register, manage risks and stay in control with easy to use web based software.
Primary Use Cases
In our work with Information Security (InfoSec) people at large, and with those in heavily regulated organizations, we typically find that they have the initial five steps in the cyber kill chain under control. These primarily involve “building the moat,” i.e. Continue readin...Read more
Information security teams often overlook the sixth step in the Information Security kill chain, Data Theft. Continue reading...
Data protection and cybersecurity are on a path to convergence. And that convergence is about to accelerate thanks to the European Union General Data Protection Regulation (GDPR). When the GDPR goes into effect in May, 2018, it will impact the global data protection landscape on an unpr...Read more