Blogs
Blogs
Learn about the latest TPRM & Cybersecurity Resources to help you keep up to date
with insights, best practices and more
Learn about the latest TPRM & Cybersecurity Resources to help you keep up to date
with insights, best practices and more
Learn about the latest TPRM & Cybersecurity Resources to help you keep up to date
with insights, best practices and more


What is PCI DSS Compliance and What's New in PCI DSS 4.0?
February 11, 2025




Understanding Third-Party Cyber Risk Management.
January 10, 2025




Third-Party Risk Management in the Energy Sector
November 1, 2024




Third Party Risk Management for aviation industry
September 11, 2024




What is Digital Operational Resilience Act (DORA)?
September 2, 2024




What You Need to Know About SEBI's TPRM Updates
August 23, 2024




SIEM vs IDS: What's The Difference?
August 19, 2024




What is Third Party Risk Management Lifecycle?
August 7, 2024




Third Party Risk Management for Healthcare Sector
July 23, 2024




Third Party Risk Management for Banking and Finance Sector
July 5, 2024




Ultimate Cybersecurity and Compliance Guide for Small Businesses
June 23, 2024




How to assess vendor risk based on the relationship?
June 3, 2024




What is Third-Party Risk Management (TPRM) ? A Complete Guide (2024)
June 3, 2024




UnitedHealth Pays $22 Million To Ransomware Group
January 1, 2024




The Prudential Financial Data Breach
February 16, 2024




Orrick, Herrington & Sutcliffe Data Breach
January 8, 2024




The Insomniac Games Data Breach
December 21, 2024




What is PCI DSS Compliance? Requirements & More
October 10, 2023




What is FISMA Compliance?
May 18, 2023




What is HIPAA Compliance?
April 29, 2023




What is Business Email Compromise (BEC)?
April 21, 2023




What is Cyber Risk Quantification?
April 7, 2023




What is Shadow IT?
April 1, 2023




What is DNS Hijacking?
February 18, 2023




What is Zero Trust Security?
February 4, 2023




What is Spear Phishing?
January 21, 2023




What is Ransomware as a Service (RaaS)?
January 11, 2023




What is Cyber Resilience?
December 23, 2022




Threats Faced by Banking and Finance
December 21, 2022




Penetration Testing: A Comprehensive Guide
December 16, 2022




Medibank Data Breach: What Happened and Lessons Learned
November 23, 2022




What is DNSSEC?
November 21, 2022




What is CIS Control Framework?
November 21, 2022




Vulnerabilities of OpenSSL 3
November 5, 2022




What is Patch Management?
November 1, 2022




What is the MITRE ATT&CK Framework?
October 28, 2022




What is SIG Questionnaire?
October 25, 2022




What is DNS?
July 12, 2022




What is Cache Poisoning?
October 12, 2022




What is a DMARC Record?
October 10, 2022




What is Genesis Platform? Overview of the Platform
June 22, 2022




What is Attack Surface Management?
June 15, 2022




What is Third-Party Risk Management (TPRM)?
June 10, 2022




What is the NIST Cybersecurity Framework?
June 5, 2022




What is GDPR Compliance?
October 1, 2022




Lapsus$ Cyberattack on Okta: What You Need to Know
September 29, 2022




The 23andMe Data Breach
February 6, 2024




10,000 Okta Credentials Compromised: What You Need to Know
September 25, 2022




Uber Hacked by 18-Year-Old in 2022
September 22, 2022


search
search

Compliance
What is PCI DSS Compliance and What's New in PCI DSS 4.0?
Learn more

Compliance
What is PCI DSS Compliance and What's New in PCI DSS 4.0?
Learn more

Compliance
What is PCI DSS Compliance and What's New in PCI DSS 4.0?
Learn more

TPRM
Understanding Third-Party Cyber Risk Management.
Learn more

TPRM
Understanding Third-Party Cyber Risk Management.
Learn more

TPRM
Understanding Third-Party Cyber Risk Management.
Learn more

TPRM
Third-Party Risk Management in the Energy Sector
Learn more

TPRM
Third-Party Risk Management in the Energy Sector
Learn more

TPRM
Third-Party Risk Management in the Energy Sector
Learn more

TPRM
Third Party Risk Management for aviation industry
Learn more

TPRM
Third Party Risk Management for aviation industry
Learn more

TPRM
Third Party Risk Management for aviation industry
Learn more

Compliance
What is Digital Operational Resilience Act (DORA)?
Learn more

Compliance
What is Digital Operational Resilience Act (DORA)?
Learn more

Compliance
What is Digital Operational Resilience Act (DORA)?
Learn more

TPRM
What You Need to Know About SEBI's TPRM Updates
Learn more

TPRM
What You Need to Know About SEBI's TPRM Updates
Learn more

TPRM
What You Need to Know About SEBI's TPRM Updates
Learn more
Load More
Book a demo with Genesis
See yourself how Genesis Platform Eliminates manual TPRM with AI
Dubai, UAE

Resources
Product
© Copyright Genesis Platform 2024, All Rights Reserved
Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.
Genesis Platform

Registered Office Address: Hamdan
Innovation Incubator, Dubai, UAE
Product
TPRM
Resources
Whitepapers
© Copyright Genesis Platform 2024, All Rights Reserved
© Copyright Genesis Platform 2024, All Rights Reserved
Dubai, UAE

Resources
Product
© Copyright Genesis Platform 2024, All Rights Reserved
Learn about the latest TPRM & Cybersecurity Resources to help you keep up to date with insights, best practices and more
Blogs
Blogs

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Registered Office Address: Hamdan
Innovation Incubator, Dubai, UAE
Product
Resources
Whitepapers
© Copyright Genesis Platform 2024, All Rights Reserved
© Copyright Genesis Platform 2024, All Rights Reserved

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Registered Office Address: Hamdan
Innovation Incubator, Dubai, UAE
Product
Resources
Whitepapers
© Copyright Genesis Platform 2024, All Rights Reserved
© Copyright Genesis Platform 2024, All Rights Reserved
Book a demo with Genesis
See yourself how Genesis Platform Eliminates manual TPRM with AI
Book a demo with Genesis
See yourself how Genesis Platform Eliminates manual TPRM with AI
Book a demo with Genesis
See yourself how Genesis Platform Eliminates manual TPRM with AI
Book a demo with Genesis
See yourself how Genesis Platform Eliminated manual TPRM with AI
Book a demo with Genesis
See yourself how Genesis Platform Eliminated manual TPRM with AI
search
search
search