Our 4.11 through 4.13 releases focus on solving operational friction points; expanding automation, strengthening integration coverage, increasing configurability, and improving contextual visibility across the platform.
These updates are designed to:
From new Continuous Control Automation (CCA) integrations to a brand-new workflow engine, these releases represent meaningful steps toward a more connected and continuously operating cyber risk management ecosystem.
Below is a detailed breakdown of what’s new and how each enhancement supports scalable cyber risk operations.
CCA relies on strong telemetry and ecosystem connectivity. As adoption increases, expanding integration coverage is critical.
These connectors enhance automated control validation and strengthen real-time posture monitoring across infrastructure, vulnerability management, third-party risk, and human risk domains.
With the introduction of Findings Management, users needed a more contextual way to review Findings tied to specific Asset Groups. Filtering within the global Findings screen helped, but wasn’t ideal.
A new Findings tab has been added to the Asset Group view to see all Findings related to that Asset Group. Filters have also been added to this view to find and sort Findings by Asset Group.
What This Enables:
This improves operational clarity and reduces friction when managing remediation.
Clients wanted a way to brand their CyberStrong instance. Previously, the logo was CyberSaint’s and could not be updated.
Now, CyberStrong users can upload a new, custom logo. This new option is embedded under:
Settings > General > Platform
Simply change the logo by uploading a new logo file.
Enterprise onboarding often requires ingesting large asset inventories. Manual Asset Group creation slowed implementation.
You can now bulk import Asset Groups directly from the Assets view.
This dramatically accelerates onboarding and reduces administrative overhead.
The original FAIR CAM implementation leveraged industry benchmark data to assign control baselines. While powerful, some organizations prefer not to use those baseline assumptions.
CyberStrong users can now disable Control Baselines under:
Settings > Risk > Risk Settings
When Disabled:
Note: If Control Baselines are disabled after risks have already been created:
This provides greater flexibility in risk modeling methodology.
Workflow automation previously focused only on controls and assessments. Clients needed more advanced orchestration capabilities.
We’ve introduced a new Workflow Engine.
The initial use case: automatically create an Assessment when an Asset Group is created, based on Asset Attribute rules.
Once built and published, workflow status is displayed in Settings > Workflows > Status.
When combined with the Onboarding Form:
This is foundational automation for enterprise-scale risk operations.
This is the initial release of the Workflow Engine. Future enhancements will include:
Taken together, these updates reinforce a core platform objective: enabling organizations to operationalize cyber risk in an automated, contextual, and scalable way.
Most importantly, these enhancements are not isolated features; they are foundational building blocks.
As we continue to evolve CyberStrong, you can expect deeper automation across workflows, broader integration coverage, expanded risk modeling flexibility, and increasingly intelligent process orchestration across the entire cyber risk lifecycle.
Our goal remains clear: To help you move from manual, fragmented risk management toward a connected, continuous, and quantified operating model.
Stay tuned for additional workflow expansions and automation capabilities in upcoming releases.