Blog

Turnkey solutions based on a holistic Zero Trust Security framework, at a fraction of the cost for a typical security engineer / managed service provider.

Security Resources

OSINT: https://osintframework.com/ MITRE Threat Hunting / Threat Models: https://medium.com/mitre-attack/getting-started-with-attack-cti-4eb205be4b2f MITRE Attack Navigator: https://mitre-attack.github.io/attack-navigator/ ISO 27001 to CIS mappings: https://identityunderground.wordpress.com/2020/09/23/extended-mapping-of-cis-controls-to-iso27001-security-controls/ CWE Top 25 Most Dangerous Software

Read More

OWASP Top 10

The Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application

Read More

Path to ISO 27001 certification

Achieving ISO 27001 means completing about 140 separate tasks, that we’ve broken down into 11 simple steps. They’re an integral part of ISMS.online. Each includes

Read More

Annex A – Controls

What Are The Annex A Controls? The Annex A Controls in ISO 27001 are divided into 14 categories. Let’s take a look through the Annex

Read More

ISO 27001 Overview

https://egs.eccouncil.org/what-do-you-know-about-iso-27001/ What Is ISO 27001? ISO 27001 is an international Standard for the implementation of an enterprise-wide Information Security Management System (ISMS), an organized approach

Read More

NIST CSF overview

https://www.isms.online/nist/ The National Institute of Standards and Technology (NIST) in the USA has produced a framework to help organisations align their cyber security defence planning and

Read More

Gap Analysis

Check: https://www.redlegg.com/advisory-services/governance-based-gap-assessments Gap Assessments are conducted for your benefit, to allow you to establish a baseline or understand how you would score in an audit

Read More

Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.