Simple CLI script to assist GRC analysts with risk ranking vendors.
-
Updated
Nov 12, 2025 - Go
Simple CLI script to assist GRC analysts with risk ranking vendors.
The Way of the Cyber Warrior: Tactical Cyber Defense
Executive-focused cybersecurity threat intelligence. Business impact analysis of current threats. C-suite language, not geek speak. Updated daily.
Cybersecurity vulnerability assessment and risk analysis of a Linux MySQL database server using NIST SP 800-30, NIST CSF, and CIA Triad principles. Includes risk scoring, control recommendations, and remediation planning.
Real-time distributed cyber-threat observatory monitoring ransomware attacks on global critical infrastructure. Features automated dark-web ingestion, Citizen Impact Scoring (CIS), and national risk heatmaps. Built with Next.js 15, Prisma, and Playwright
Enterprise identity and access risk analysis project identifying privileged access exposure, segregation of duties violations, and orphaned high-risk accounts using SQL and Excel
OSINT-based threat intelligence assessment analyzing phishing, brand impersonation, and identity-centric risks affecting an IAM provider.
Repository for Cybrary Security Engineering & Cyber Risk – includes notes, docs, scenarios, extras, and certificate of completion.
Add a description, image, and links to the cyber-risk topic page so that developers can more easily learn about it.
To associate your repository with the cyber-risk topic, visit your repo's landing page and select "manage topics."