UNDER CONSTRUCTION - donβt mind the unorganized layout, but here is a piece of what to expect
Promising Cyber Tools
- IT Network Mapping Technologies
- https://teleseer.com/ - can be used for tons of different situations inside and outside of cyber
Cyber & Data Privacy Intelligence Sources - Databases & Sources to Use for Analytics and Integrating Apps/Services + Platforms for Risk Management
Vendors
Related Solution Terminology and Buzzwords
Externally Mapped
- Vendor Intelligence
- Vendor Profiling
- Vendor Management
- 3rd Party Risk Management - TPRM
- IT Vendor Risk Management
- Procurement
- Risk Governance
- Risk Management
- Data Governance
- Data Privacy
- GDPR Vendor Management
Internally Mapped
- RBVM - Risk-Based Vulnerability Management
- ASOC - Application Security Orchestration and Correlation