Skip to main content

Books

Attack Surface Management

Attack Surface Management (ASM) is a cybersecurity practice focused on the continuous discovery, analysis, prioritization, reme...

CIM Module- Let's Start

Culture and Awareness

This section describes the modules that promote strong culture and heightened awareness  that can significantly reduce the risk...

Cyber Detection and Response

This section provides tools for proactive threat detection and swift response, including Cyber Incident Monitoring, Security Or...

Cyber Governance

Ensure compliance and effective governance with features such as Security Compliance, Privacy Compliance, Governance and Manage...

Cyber Resiliency

Ensure business continuity and resilience against cyber threats with Business Continuity Management, Disaster Recovery Planning...

Cyber Risk Management

Identify, assess, and manage cyber risks with modules covering Social Engineering, Supply Chain Risk Management, Virtual Penetr...

Dashboard Overview

Upon logging in, you'll be greeted by the dashboard, your central hub for monitoring and managing your organization's cybersecu...

Identity and Data Governance

Secure identities and data with Privileged Account Review, Data Security Posture Management, Identity and Access Review, and Da...

Infrastructure Security

Infrastructure security involves protecting critical systems and assets, such as networks, data centers, and power grids, from ...

Introduction to Linters

Linters are tools that analyze source code to flag programming errors, bugs, stylistic errors, and suspicious constructs. They ...

Log Collector FAQs

These are FAQs related to the installation of the CyTech Log Collector.

Log Collector Installations

O365 FAQs

Phishing Simulation FAQs

System Integrations

Updates for 2024