


Catchpoint Achieves ISO/IEC 27001:2013 Certification Streamlined by TrustNet
Catchpoint®, the worldwide leader in digital experience observability, announced today that it has successfully completed ISO/IEC 27001:2013 accreditation. TrustNet – global cybersecurity and compliance service provider, helped streamline the formal audit procedure...
2022 Revisions to ISO 27002
Blog 2022 Revisions to ISO 27002 2022 Revisions to ISO 27002 Impacts on ISO 27001 ISO 27002 is the companion standard to ISO 27001 and provides best practices for implementing information security controls. The latest version, ISO 27002:2022, was published on...
ISO 27001 Controls: Identify and Address Information Risks
What Are ISO27001 controls? Improving the security of information assets is an intensely complex process that varies according to organizational need, industry, and risk level. Therefore, the ISO 27001 controls list that a specific company focuses upon would be...
What Is ISO 27001?
In today’s global business milieu where reliance on technology is increasingly prevalent, companies in all industries must protect their digital security. Gaining ISO 27001 certification verifies that these steps have been taken to safeguard internal systems and...
How Long Does ISO 27001 Certification Take?
Blog How Long Does ISO 27001 Certification Take? How Long Does ISO 27001 Certification Take? When your company stores, transmits, or otherwise manages data of any kind, keeping it safe and out of the hands of un-authorized entities must be the number one priority for...
ISO 27001 vs. ISO 27002
Blog ISO 27001 vs. ISO 27002 ISO 27001 vs. ISO 27002 In the world of information security, two standards often come up: ISO 27001 and ISO 27002. But what exactly are they? ISO 27001 specifies the requirements for establishing, implementing, maintaining, and...
ISO 27001 vs NIST Cybersecurity Framework
Blog ISO 27001 vs NIST Cybersecurity Framework ISO 27001 vs NIST Cybersecurity Framework Numerous laws and regulations worldwide require corporations to adopt them to secure their data. NIST CSF and ISO 27001 are two of the most prevalent in North America. While both...
ISO 27001 Certification Process Step-by-Step
Blog ISO 27001 Certification Process Step-by-Step ISO 27001 Certification Process Step-by-Step Increasingly, information security management is becoming a critical, top-priority issue for organizations of all sizes. Whether you serve a domestic or global customer...
ISO 27001 Checklist
ISO 27001 (formerly known as ISO/IEC 27001:27005) is a set of specifications that helps you to assess the risks found in your information security management system (ISMS). Implementing it helps to ensure that risks are identified, assessed and managed in a...
ISO 27001 Risk Assessment Methodology
Blog ISO 27001 Risk Assessment Methodology ISO 27001 Risk Assessment Methodology Conducting an internal ISO 27001 audit enables you to assess your company’s security equipment, systems, protocols and procedures to ensure that they are in compliance with industry...