Stay ahead: Strengthen your business with third-party risk management

Third Party Risk Management

With the fast-paced business style, organisations nowadays heavily rely on third parties such as vendors, suppliers, logistics partners, cloud services providers, etc. These partnerships can offer great benefits but also could expose your organisation to risks. That’s where third-party risk management (TPRM) comes into play. TPRM provides a structured approach to evaluating and mitigating these potential risks.

Ready to take control and protect your business? Let’s dive into the world of TPRM!

Read More


Axenic announces new product offering – substantial security improvement for Government agencies!

Axenic is proud to announce our new product offering which will substantially improve security at government agencies!

Government agencies have been telling us for years that they have struggled to implement the cable colour standards in the NZISM. Hampered by the fact that they don’t own the data centres, that it is hard to discover which cables are carrying which traffic, and that many of the data centres are overseas – agencies have given up. No longer!  Read More

From Chaos to Conformance: 4 Context of the organisation

Information security is all about context!

In my previous two articles in this series focused on developing an Information Security Management System (ISMS) based on ISO 27001:2013, I presented the common myths associated with the standard. In this article, I am going to provide an overview of the standard and section 4 Context of the organisation.

Read More


From Chaos to Conformance: More ISO 27001 myths

Dispelling more common myths

Okay, I know I promised to delve into and discuss the requirements defined in 4 Context of the organisation. However, I realised that they are other common myths that I should dispel for those of you that are interested in implementing an Information Security Management System (ISMS) that conforms with ISO/IEC 27001:2013 (ISO 27001).

Read More