Click here to sign up for a Free RiskTree trial >>

Cyber Security News and Insights

Category: RiskTree

banner montage, representing Attack Trees
Find out why the National Cyber Security Centre recommends using Attack Trees for understanding and addressing cyber risks. And, how RiskTree systematically analyses risks to support clear decision-making and a purposeful risk strategy.
Recently we discussed the security of RiskTree with a client, who ran through the NCSC Cloud Security Principles. Since RiskTree is delivered as software-as-a-service, this made sense. One point that arose was the lack of Multi-Factor Authentication (MFA) in use: CSP Principle 10 states that 2FA is ‘considered good practice’, using either a hardware or software token or out-of-band challenge.
News Categories: