Skip to main content

Recently Updated Pages

AQUILA - Endpoint Detection and Response (EDR) Manual Installation

AQUILA EDR Installation

Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, i...

Updated 2 weeks ago by Richmond Abella

Data Loss Prevention (DLP)

Data Security

Overview The Data Loss Prevention is a critical tool for monitoring and managing security risks ...

Updated 2 weeks ago by Noah

User and Entity Behavior Analysis (UEBA)

Identity Security

Overview This system is designed to monitor user behavior, detect anomalies, and track authentic...

Updated 2 weeks ago by Noah

Business Continuity Management (BCM)

Risk Management

Overview The Business Continuity Planning (BCP) module in AQUILA provides an easy way to documen...

Updated 2 weeks ago by Noah

Supply Chain Risk Management (SCRM)

Risk Management

Overview: This module offers a comprehensive, data-driven solution for managing the organization...

Updated 2 weeks ago by Noah

Business Impact Analysis (BIA)

Risk Management

Overview The Business Impact Analysis Dashboard provides a comprehensive view of the entire busi...

Updated 2 weeks ago by Noah

Cyber Security Risk Management (CSRM)

Risk Management

Overview: Cyber Security Risk Management (CSRM) is a structured process organizations use to ide...

Updated 2 weeks ago by Noah

CyTech AQUILA - Unified Compliance Framework (UCB)

Cyber Compliance

Overview The Unified Compliance Blueprint is a module within Cyber Compliance designed to help s...

Updated 2 weeks ago by Noah

Information Security Steering Committee (ISSC)

Cyber Governance

Overview The ISSC Meeting System is a centralized platform designed to help committees plan, man...

Updated 2 weeks ago by Noah

Cyber Training, Culture, and Awareness

Cyber Governance

Overview: The Cyber Training, Culture, and Awareness provides a centralized view of phishing sim...

Updated 2 weeks ago by Noah

Charters, Policies, and Procedures

Cyber Governance

Overview: The Charters, Policies, and Procedures Dashboard offer a centralized platform for mana...

Updated 2 weeks ago by Noah

Cyber Annual Workplan

Cyber Governance

Overview: The Cyber Annual Workplan Module Dashboard provides a comprehensive view of all ongoin...

Updated 2 weeks ago by Noah

Cyber Threat Intelligence (CTI)

Cyber Monitoring

Overview: The CTI (Cyber Threat Intelligence) Module provides real-time insights into emerging t...

Updated 2 weeks ago by Noah

Security Orchestration, Automation, and Response (SOAR)

Cyber Monitoring

Overview: The SOAR module helps streamline and enhance security operations by automating respons...

Updated 2 weeks ago by Noah

Cloud Security Posture Management (CSPM)

Cyber Monitoring

Overview: CSPM helps secure your cloud infrastructure by discovering and evaluating cloud servic...

Updated 2 weeks ago by Noah

CyTech AQUILA - Cyber Incident Management (CIM) Module

Cyber Monitoring

Overview: Cyber Incident Management (CIM) is the end-to-end process of preparing for, detecting,...

Updated 2 weeks ago by Noah

Cyber Risk Assessment Management (CRAM) / OUTDATED

CRAM™ Onboarding Guide

Overview The Cyber Risk Assessment Management (CRAM) framework is designed to provide a comprehe...

Updated 2 weeks ago by Noah

JWT For Kali

System Integrations

To create a JSON Web Token (JWT) for Salesforce on Kali Linux, you can follow the steps below. Ka...

Updated 2 weeks ago by Noah

NG SIEM- AWS CSPM Integration

Agent-less Integration

Introduction CSPM discovers and evaluates the services in your cloud environment, like storage, ...

Updated 2 weeks ago by Noah

Log Collector Installation - Linux Manual

Log Collector Installations

Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for d...

Updated 2 weeks ago by Noah