Skip to main content

Recently Updated Pages

Overview

Dashboard Overview

Cyber-Compliance (1 Module): This section introduces the Cyber Security Compliance module—a...

Updated 2 months ago by Darryl Espancho

Phishing Simulation Manual

Culture and Awareness

Overview Welcome to the Phishing Simulation module. In this section, you'll be guided through th...

Updated 3 months ago by Richmond Abella

GCP - Setup a Log Sink

System Integrations

Setup Log Sink Using Google Cloud Console Navigate to "Logging" > "Log Router" > "Create Sin...

Updated 3 months ago by Richmond Abella

GCP - How to Add a Role

System Integrations

Go to the Google Cloud Console. Navigate to IAM. Click on "IAM & Admin" in the left...

Updated 3 months ago by Richmond Abella

GCP - How to enable Cloud Asset API

System Integrations

Please refer to these instructions to enable Cloud Asset API. To enable the Cloud Asset API fo...

Updated 3 months ago by Richmond Abella

Add Windows Integrations

System Integrations

Introduction  The Windows integration allows you to monitor the Windows OS, services, applicatio...

Updated 3 months ago by John Polestico

Open Cases

Dashboard Overview

In this section, you'll find a comprehensive overview of open cases within your organization. Her...

Updated 3 months ago by John Polestico

Risk Score

Dashboard Overview

The risk score serves as a comprehensive indicator of your company's overall risk level. This sco...

Updated 3 months ago by John Polestico

Cyber Security Risk Management

Cyber Risk Management

Overview: Cyber Security Risk Management is a systematic approach to identifying, assessing, and...

Updated 3 months ago by John Polestico

Security Assessment Questionnaires

Cyber Governance

Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate t...

Updated 3 months ago by John Polestico

Privacy Compliance

Cyber Governance

Overview The Privacy Compliance module, a component of the Software-as-a-Service (SaaS) vCISO Wo...

Updated 3 months ago by John Polestico

Vulnerability Assessment and Management

Attack Surface Management

Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll ...

Updated 3 months ago by John Polestico

Threat Intelligence

Attack Surface Management

Overview This advanced module operates as a virtual threat analyst, continuously gathering, anal...

Updated 3 months ago by John Polestico

Source Destination Map

Dashboard Overview

This section provides a visual representation of the geographical locations from which attackers ...

Updated 3 months ago by John Polestico

Google Cloud Platform (GCP) Audit Logs Integration - using Pub/Sub

System Integrations

Requirements   To integrate with Google Cloud Platform (GCP), you need to set up the following: ...

Updated 3 months ago by Richmond Abella

System Integrations

System Integrations

Introduction  The System integration allows you to monitor servers, personal computers, and more...

Updated 3 months ago by John Polestico

Google Workspace Integrations

System Integrations

Introduction  Google Workspace (formerly G Suite) is a suite of cloud computing, productivity an...

Updated 3 months ago by John Polestico

GitHub Integration - Elastic

System Integrations

GitHub Integration The GitHub integration collects events from the GitHub API(external, opens in...

Updated 3 months ago by Richmond Abella

CRAM View

Dashboard Overview

CRAM View provides a dynamic visualization of your organization's structure, offering real-time i...

Updated 3 months ago by John Polestico

Azure Application Insights Integration

System Integrations

Overview The Application Insights Integration allows users to retrieve application insights metr...

Updated 3 months ago by Richmond Abella