June 2019

Compliance June 25, 2019

4 minute Read

SIGNS YOUR ORGANIZATION NEEDS A GRC SOLUTION

Before beginning, you might ask yourself: Does my organization need a GRC Solution? The simple answer is yes. There are complex frameworks and...

May 2019

Cyber Security May 06, 2019

8 minute Read

FedRAMP Pentesting Requirements

If you’re doing business in the cloud, odds are you know a thing or two about compliance maintenance. This article highlights The Federal Risk and...

March 2019

Cyber Security March 05, 2019

4 minute Read

What is Risk Exception

A business unit wants to hire a vendor that doesn’t meet policy standards and requests an exception. Approve or deny the exception request? That’s the...

February 2019

Cyber Security February 25, 2019

24 minute Read

CISOs ULTIMATE GUIDE FOR TOP 30 SECURITY & PRIVACY SECURITY FRAMEWORKS – 2019

There are over 200 security frameworks, regulations, standards and guidelines that could impact your business. In this article, Ignyte has compiled the top 30...

Compliance February 25, 2019

7 minute Read

Top Healthcare Industry Cybersecurity Compliance Frameworks

Cybersecurity frameworks within the healthcare industry are used to enhance security posture and for meeting compliance requirements. This report features the...

Cyber Security February 21, 2019

3 minute Read

UNDERSTANDING SOFTWARE EXPLOIT SCORING TODAY.

Even with years of related industry experience an individual can become lost in all of the acronyms surrounding security vulnerabilities in modern software. In...

Cyber Security February 11, 2019

4 minute Read

We are compliant why do we need a security program?

This article takes a high level simplistic overview of compliance showing weaknesses, and offers a solution towards a more secure business...

Compliance February 07, 2019

4 minute Read

HOW NOT TO BECOME A TARGET WITH ENOUGH FOR TWO LINES OR EVEN THREE

In mid-November last year, the retail giant Target experienced a security breach where customers’ credit card information was stolen. At first it was...

Cyber Security February 05, 2019

47 minute Read

STATE SECURITY BREACH NOTIFICATION LAWS

Breach notification law is not standardized across the U.S. and each state has their own breach notification law. Ignyte has compiled every state statute...

Cyber Security February 04, 2019

3 minute Read

In-House Counsel: Best Legal Practices in Data Breaches

It’s clear that data breaches disrupt and cause losses. If your organization has not yet experienced a sizeable data breach, get ready. Read about Best...

January 2019

Press Releases January 24, 2019

2 minute Read

Ignyte – GRC Company for Cybersecurity Receives Funding

Ignyte Assurance Platform, an industry leader in managing governance, risk and compliance (GRC), has received $100,000 from the state of Ohio to develop...

General January 23, 2019

4 minute Read

Benefits of a Secure Software Development Life Cycle (SDLC)

This article discusses the benefits of implementing a secure development life cycle in your software development...

Cyber Security January 22, 2019

3 minute Read

7 CISO Risk Management Priorities For 2019

The purpose of this article is to examine essential areas for CISO’s to spend their time and money in the New Year. With increasing threats and tougher...

Compliance January 17, 2019

2 minute Read

2019 Security Predictions

2019 is the year to look at modern GRC tools and 3rd party risk management. An automated tool such as the Ignyte Assurance Platform can...

Cyber Security January 17, 2019

3 minute Read

Facing Legal Costs of Cyber Risks in 2019

In 2019, the greatest challenge for corporate legal departments in managing cyber issues may be paying for them. This article discusses legal costs of a...
1 2 3 4