How tos (1)
How tos category
FAQs (8)
FAQs category
-
Lightweight Supplier Due Diligence Questionnaire
-
Comprehensive Supplier Due Diligence Questionnaire
-
Using Lightweight Supplier Due Diligence Questionnaires
-
Why should we use specialist pentesters for maritime testing rather than testers from People per Hour?
-
OT-Specific Security Testing Frameworks for the Maritime Sector
-
Does MSC.428(98) require Penetration Testing?
-
Why You Need a SOC for DORA Compliance
-
Third-Party Risk Management for Regulatory Compliance (NIS2, GDPR, and DORA)
-
The Role of a Virtual Chief Information Security Officer (vCISO) in NIS2 and DORA Compliance
SOC (7)
Security Operations Center
-
Keeping Your Incident Response Playbooks Up to Date
-
Incident Response Playbook for Large-Scale Compromise (Updated 2025)
-
Incident Response Playbook for Ransomware Attacks (Updated 2025)
-
Common Types of Cybersecurity Incidents
-
Understanding the Incident Response Lifecycle
-
What is Incident Response?
-
Understanding Log Management and Retention in a SOC
-
What is File Integrity Monitoring (FIM) and Why Is It Important?
-
The Role of Machine Learning and AI in Modern SOCs
-
Best Practices for Auditing and Reporting in SOC Operations
-
Incident Reporting Requirements Under GDPR, NIS2, and DORA
-
The Role of Cybersecurity in IMO Resolution MSC.428(98)
-
How to Interpret CVSS, VPR, and RWRS Scores
-
Understanding Risk in a SOC Context: Operational, Technical, and Business Risk
-
Exploring the Relationship Between SOC Priority Levels and RWRS, CVSS, and VPR Scores