<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Risk Management Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/risk-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/risk-management/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Tue, 07 Apr 2026 01:41:48 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Risk Management Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/risk-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity and the Power of Delayed Gratification: Why Secure Companies Win in the Long Term</title>
		<link>https://www.vertexcybersecurity.com.au/cybersecurity-and-the-power-of-delayed-gratification-why-secure-companies-win-in-the-long-term/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-and-the-power-of-delayed-gratification-why-secure-companies-win-in-the-long-term</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 01:41:47 +0000</pubDate>
				<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Business Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Delayed Gratification]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10533</guid>

					<description><![CDATA[Explore how the principle of delayed gratification applies to cybersecurity and why companies that invest in long-term protection are more likely to achieve sustained success.]]></description>
		
		
		
			</item>
		<item>
		<title>Global Major Cyber GRC Platform and its $32M SOC2 Scam: Why Rapid Compliance is a Security Red Flag</title>
		<link>https://www.vertexcybersecurity.com.au/global-major-cyber-grc-platform-and-its-32m-soc2-scam-why-rapid-compliance-is-a-security-red-flag/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=global-major-cyber-grc-platform-and-its-32m-soc2-scam-why-rapid-compliance-is-a-security-red-flag</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 02:46:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[SOC2]]></category>
		<category><![CDATA[Audit Fraud]]></category>
		<category><![CDATA[Cyber Security Compliance]]></category>
		<category><![CDATA[Delve Scandal]]></category>
		<category><![CDATA[GRC Platform]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SOC 2]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10479</guid>

					<description><![CDATA[The $32 million Delve scandal proves why rapid compliance is a security red flag. Learn how this SOC2 scam worked and how to choose a legitimate GRC platform.]]></description>
		
		
		
			</item>
		<item>
		<title>The &#8220;OpenClaw&#8221; Incident: Why Even AI Security Experts Are Getting Caught Out</title>
		<link>https://www.vertexcybersecurity.com.au/the-openclaw-incident-why-even-ai-security-experts-are-getting-caught-out/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-openclaw-incident-why-even-ai-security-experts-are-getting-caught-out</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sun, 01 Mar 2026 22:10:15 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[email security]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[Meta]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10329</guid>

					<description><![CDATA[A Meta AI researcher’s assistant recently went rogue, deleting emails and ignoring commands. Discover why AI understanding is still lacking and how to protect your business.]]></description>
		
		
		
			</item>
		<item>
		<title>White House Rescinds SBOM Mandates: A Strategic Shift in Software Supply Chain Security</title>
		<link>https://www.vertexcybersecurity.com.au/white-house-rescinds-sbom-mandates-a-strategic-shift-in-software-supply-chain-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=white-house-rescinds-sbom-mandates-a-strategic-shift-in-software-supply-chain-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 23:18:09 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[HBOM]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SBOM]]></category>
		<category><![CDATA[Software Supply Chain]]></category>
		<category><![CDATA[White House]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10265</guid>

					<description><![CDATA[The White House has rescinded mandatory SBOM requirements in favour of a risk-based approach. Learn what this shift means for software supply chain security.]]></description>
		
		
		
			</item>
		<item>
		<title>Why Small Businesses Are Never &#8220;Too Small&#8221; to Be Targeted by Cyber Attackers</title>
		<link>https://www.vertexcybersecurity.com.au/why-small-businesses-are-never-too-small-to-be-targeted-by-cyber-attackers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-small-businesses-are-never-too-small-to-be-targeted-by-cyber-attackers</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 23:06:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Phishing Prevention]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[small business]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10263</guid>

					<description><![CDATA[Many small businesses believe they are too small to be targeted by hackers. Discover why small businesses are actually prime targets and how you can protect yours.]]></description>
		
		
		
			</item>
		<item>
		<title>The Hidden Cost of Cheap Malware Protection: Lessons from the Langley Twigg Law Firm Breach</title>
		<link>https://www.vertexcybersecurity.com.au/the-hidden-cost-of-cheap-malware-protection-lessons-from-the-langley-twigg-law-firm-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-hidden-cost-of-cheap-malware-protection-lessons-from-the-langley-twigg-law-firm-breach</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 23:04:07 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Business Resilience]]></category>
		<category><![CDATA[Case Study]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Langley Twigg]]></category>
		<category><![CDATA[Law Firm]]></category>
		<category><![CDATA[Malware Protection]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10261</guid>

					<description><![CDATA[Using the Langley Twigg Law attack as a case study, discover why saving money on cheap malware protection can lead to devastating data breaches and hidden costs.]]></description>
		
		
		
			</item>
		<item>
		<title>The Risk-Prepared Backpack: Essential Items for Navigating the Unexpected</title>
		<link>https://www.vertexcybersecurity.com.au/the-risk-prepared-backpack-essential-items-for-navigating-the-unexpected/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-risk-prepared-backpack-essential-items-for-navigating-the-unexpected</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 12:30:11 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[emergency backpack]]></category>
		<category><![CDATA[everyday carry]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Risk preparedness]]></category>
		<category><![CDATA[survival essentials]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10228</guid>

					<description><![CDATA[Discover the essential items to pack in your backpack for effective risk management. From satellite connectivity to analog tools, learn how to be prepared for life's unexpected curveballs.]]></description>
		
		
		
			</item>
		<item>
		<title>Why Frequent Production Bugs are a Major Red Flag for Your Cyber Security</title>
		<link>https://www.vertexcybersecurity.com.au/why-frequent-production-bugs-are-a-major-red-flag-for-your-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-frequent-production-bugs-are-a-major-red-flag-for-your-cyber-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 12 Jan 2026 05:05:40 +0000</pubDate>
				<category><![CDATA[Uncategorised]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Production Issues]]></category>
		<category><![CDATA[Quality Assurance]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Secure Coding]]></category>
		<category><![CDATA[Software Development]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10190</guid>

					<description><![CDATA[Frequent production issues and developer "quick fixes" are major signs that your platform's cyber security is lacking. Learn why code quality and security are linked.]]></description>
		
		
		
			</item>
		<item>
		<title>Read This Before Purchasing Scrut Automation</title>
		<link>https://www.vertexcybersecurity.com.au/read-this-before-purchasing-scrut-automation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=read-this-before-purchasing-scrut-automation</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 22:52:53 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[Business Strategy]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[GRC]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Scrut Automation]]></category>
		<category><![CDATA[SOC 2]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9989</guid>

					<description><![CDATA[Considering Scrut Automation? Read this review first. We analyse the limits of "smart GRC," the reality of unified risk platforms, and why a spreadsheet might be a better start.]]></description>
		
		
		
			</item>
		<item>
		<title>Read This Before You Buy Sprinto</title>
		<link>https://www.vertexcybersecurity.com.au/read-this-before-you-buy-sprinto/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=read-this-before-you-buy-sprinto</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 22:45:04 +0000</pubDate>
				<category><![CDATA[compliance]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[ISO27001]]></category>
		<category><![CDATA[SOC]]></category>
		<category><![CDATA[Compliance Platforms]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SOC 2]]></category>
		<category><![CDATA[Sprinto]]></category>
		<category><![CDATA[startups]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9985</guid>

					<description><![CDATA[Thinking of buying Sprinto? Read this first. We analyse the risks of "sprinting" through compliance, the limitations of "autopilot," and why you should compare it to a spreadsheet first.]]></description>
		
		
		
			</item>
	</channel>
</rss>
