Asset types



Product types



Topic

Acting on Classified Data to Achieve Regulatory Compliance

Data classification is a critical part of any information security and compliance program, especially if your organisation stores copious amounts of data or uses email to communicate internally or externally. […]


View
Placeholder image

Using Multi-Layer Reporting for Company Wide Data Security Alignment

Cyber security and data compliance have become a very important companywide responsibility. The impact of a cyber security breach or a data leak on an organisation has grown at a […]


View
Placeholder image

CMMC and what it means for DoD Contractors

CMMC stands for “Cybersecurity Maturity Model Certification”. The CMMC gives the department a mechanism to certify the cyber readiness of the largest defense contractors — those at the top who […]


View
Placeholder image

CMMC and Managing C.U.I. in the DIB (Defense Industrial Base)

There is an old saying. How do you eat an elephant? Answer – In small bites. The Defense Industrial Base Sector is the worldwide industrial complex that enables research and […]


View
Placeholder image

Why a maturity model will win the day!

Can regulators and businesses keep pace with the rate of change that the world is experiencing? The regulatory landscape is changing rapidly in many industries as the threat landscape is […]


View
Placeholder image

Getvisibility talks about CMMC

As of June 2020, many companies that work with the US DoD will soon need to meet CMMC requirements to bid on contracts. This has led to many enquiries into […]


View
Placeholder image

Getvisibility Signs Exciting Partnership with immixGroup

Getvisibility, a leading worldwide provider of enterprise data security and classification software today announced that it has signed a public sector distribution agreement with immixGroup. The agreement with immixGroup, the […]


View
Placeholder image

Cybersecurity Post Pandemic

The Covid-19 pandemic has not only caused global disruption it has also changed the cybersecurity landscape. We are observing changing patterns of behaviour from threat actors and experiencing waves of […]


View
Placeholder image

The Impact of Working from Home during Covid-19 on Data Security

As of May 2nd 2020, FBI recorded a 300% increase in reported cyber security crimes (IMC Grupo) “The Covid- 19 pandemic is not only causing global disruption it’s also changed […]


View
Placeholder image

Extracting Value from your Big Data

How does one define valuable data? Loosely, having valuable data means being in a position to effectively problem solve, innovate and support decision making using accurate and timely data. It […]


View

SPEAK TO ONE OF OUR EXPERTS