<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Knowledge Base on Cyber Matters</title>
    <link>/knowledge-base/</link>
    <description>Recent content in Knowledge Base on Cyber Matters</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="/knowledge-base/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>ISO 27001 Overview: What It Is and What It Requires</title>
      <link>/knowledge-base/iso-27001-overview/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/knowledge-base/iso-27001-overview/</guid>
      <description>&lt;h2 id=&#34;what-iso-27001-actually-is&#34;&gt;What ISO 27001 Actually Is&lt;/h2&gt;&#xA;&lt;p&gt;ISO 27001 is the international standard for Information Security Management Systems (ISMS). It specifies the requirements for establishing, implementing, maintaining, and continually improving a system for managing information security risk.&lt;/p&gt;&#xA;&lt;p&gt;Certification means an accredited third-party auditor has verified that your ISMS meets the standard. It doesn&amp;rsquo;t mean you&amp;rsquo;re unbreachable — it means you have a documented, tested, and managed approach to security.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;the-structure-of-the-standard&#34;&gt;The Structure of the Standard&lt;/h2&gt;&#xA;&lt;p&gt;ISO 27001:2022 is organised into two main parts:&lt;/p&gt;</description>
    </item>
    <item>
      <title>ISO 42001: The AI Management System Standard</title>
      <link>/knowledge-base/iso-42001-overview/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/knowledge-base/iso-42001-overview/</guid>
      <description>&lt;h2 id=&#34;what-iso-42001-is&#34;&gt;What ISO 42001 Is&lt;/h2&gt;&#xA;&lt;p&gt;ISO 42001:2023 is the international standard for Artificial Intelligence Management Systems (AIMS). It provides a framework for organisations to develop, provide, or use AI systems responsibly — covering governance, risk management, transparency, and accountability.&lt;/p&gt;&#xA;&lt;p&gt;Think of it as ISO 27001, but for AI. It follows the same High Level Structure (Annex SL) as other ISO management system standards, making integration with an existing ISMS straightforward.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;who-needs-it&#34;&gt;Who Needs It&lt;/h2&gt;&#xA;&lt;p&gt;ISO 42001 is relevant for three types of organisations:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Security Policies: What You Actually Need and How to Write Them</title>
      <link>/knowledge-base/security-policies-guide/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/knowledge-base/security-policies-guide/</guid>
      <description>&lt;h2 id=&#34;the-policy-problem&#34;&gt;The Policy Problem&lt;/h2&gt;&#xA;&lt;p&gt;Most organisations have one of two problems: either they have no policies at all, or they have dozens of policies that nobody reads, nobody follows, and nobody updates.&lt;/p&gt;&#xA;&lt;p&gt;Neither is compliant. Neither is useful.&lt;/p&gt;&#xA;&lt;p&gt;Good security policies are short, clear, and connected to real controls. They tell people what is expected of them — and the organisation has mechanisms to verify compliance.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;which-policies-do-you-actually-need&#34;&gt;Which Policies Do You Actually Need?&lt;/h2&gt;&#xA;&lt;p&gt;For ISO 27001 or SOC 2, you don&amp;rsquo;t need a 200-page policy library. You need a coherent set of documents that covers your risk landscape. For most organisations, that&amp;rsquo;s around 15–20 policies:&lt;/p&gt;</description>
    </item>
    <item>
      <title>SOC 2 Explained: Type I, Type II, and What Auditors Actually Look For</title>
      <link>/knowledge-base/soc-2-overview/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/knowledge-base/soc-2-overview/</guid>
      <description>&lt;h2 id=&#34;soc-2-is-a-report-not-a-certification&#34;&gt;SOC 2 Is a Report, Not a Certification&lt;/h2&gt;&#xA;&lt;p&gt;The first thing to understand about SOC 2 is that it&amp;rsquo;s not a certification like ISO 27001. It&amp;rsquo;s an audit report — a document produced by a licensed CPA firm that describes your controls and attests to their design or effectiveness.&lt;/p&gt;&#xA;&lt;p&gt;Your customers request this report as evidence that you take security seriously. It&amp;rsquo;s particularly common in North American enterprise procurement.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;the-five-trust-services-criteria&#34;&gt;The Five Trust Services Criteria&lt;/h2&gt;&#xA;&lt;p&gt;SOC 2 audits are structured around Trust Services Criteria (TSC). You must include &lt;strong&gt;Security&lt;/strong&gt; (the Common Criteria). Everything else is optional:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Third-Party Risk Management: A Practical Framework</title>
      <link>/knowledge-base/tprm-fundamentals/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/knowledge-base/tprm-fundamentals/</guid>
      <description>&lt;h2 id=&#34;why-third-party-risk-is-everybodys-problem&#34;&gt;Why Third-Party Risk Is Everybody&amp;rsquo;s Problem&lt;/h2&gt;&#xA;&lt;p&gt;Your security posture is only as strong as your weakest vendor. If a third party has access to your systems or data and they get breached, you get breached — regardless of how good your own controls are.&lt;/p&gt;&#xA;&lt;p&gt;Third-party incidents account for a significant and growing proportion of data breaches. The attack surface isn&amp;rsquo;t just your perimeter; it&amp;rsquo;s every SaaS tool, every contractor, every API integration.&lt;/p&gt;</description>
    </item>
    <item>
      <title>What is GRC and Why Does It Matter?</title>
      <link>/knowledge-base/what-is-grc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/knowledge-base/what-is-grc/</guid>
      <description>&lt;h2 id=&#34;the-short-version&#34;&gt;The Short Version&lt;/h2&gt;&#xA;&lt;p&gt;GRC stands for Governance, Risk, and Compliance. It&amp;rsquo;s the set of processes, policies, and controls an organisation puts in place to operate responsibly, manage uncertainty, and meet its obligations — to customers, regulators, and itself.&lt;/p&gt;&#xA;&lt;p&gt;The term gets thrown around a lot, often by people selling software. This guide cuts through the noise.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;governance-who-decides-what&#34;&gt;Governance: Who Decides What&lt;/h2&gt;&#xA;&lt;p&gt;Governance is about accountability. It answers the question: who is responsible for what, and how are decisions made?&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
