Achieve USGCB compliance
Baseline configurations for IT systems have long been used in the enterprise for security hardening, to reduce costs and improve the service IT depart…
Complying with the Defence Cyber Protection Partnership
The Ministry of Defence requires all suppliers to adhere to the requirements set out in the Defence Cyber Protection Partnership’s (DCPP) Cyber Securi…
Achieving regulatory compliance
This paper discusses the concept of layered security for desktop computers; why it’s needed to meet compliance requirements set out by regulatory bodi…
Guide to meeting requirements of MAS
In this whitepaper we take a closer look at the Monetary Authority of Singapore's Technology Risk Management document and how you can comply with it.
Achieving HITRUST CSF compliance
The Health Information Trust Alliance (HITRUST) is a USbased privately held firm that, in collaboration with healthcare, technology and information se…
Achieving CSEC compliance
This short guide puts the focus on Communications Security Establishment Canada guidance and the benefits of implementing the advice.
Guide to the NYDFS Cybersecurity Requirements
This article explains how Avecto's Defendpoint software allows these organizations to meet the access privileges and application security requirements…
Meet the requirements of the UK Government Cyber Essentials Scheme
Businesses are at greater risk than ever before from cyber attacks, but a lack of resources, expertise and awareness has left SMEs vulnerable.