Sign-up for a RiskTree trial >>

Cyber Security News and Insights

Category: Risk Analysis

Probability/impact graphs have been used for a long time to assess risk, especially in spreadsheet-based risk registers. They give a misleading impression of risk levels though and hence organisations should be using alternative, and better approaches.
When you start using RiskTree, a powerful risk assessment tool, it's important to grasp the nuances of different risk types: intrinsic, residual, and target. These terms sometimes spark confusion, as their meanings aren't always universally clear. Let's demystify these concepts for a clearer understanding.
This post details why we implemented bowtie analytics in RiskTree. And, how RiskTree users can now build bow tie diagrams from their existing trees.
how to implement Boolean Logic in risktree
Boolean Logic is a form of algebra that is centered around three simple words known as Boolean Operators: “Or,” “And,” and “Not.” If you're wondering how how to apply this in RiskTree, this post will help!
why should I use attack trees?
Attack trees allow you to build a structured model of your risks. These can be quickly and easily updated as changes are made to the system being assessed. Rather than being an unwelcome annual process, updating the risk assessment becomes part of the day-to-day process. If you’re building a new system, it will integrate with project management, creating a virtuous circle..
banner montage, representing Attack Trees
Find out why the National Cyber Security Centre recommends using Attack Trees for understanding and addressing cyber risks. And, how RiskTree systematically analyses risks to support clear decision-making and a purposeful risk strategy.
There’s a lot that you can do, and I’m sure there’s a lot that you aspire to do. But get an understanding of where you stand today, where you need immediate improvement, and where you hope to immediately see value. This will get you on the front foot. More tips...
News Categories: