News & Insights
- Capacity Building
- Cyber attack
- Cyber security
- Data protection
- Geopolitical Risk
- Incident Response
- Information security
- ISO 27001
- PCI DSS
- Penetration testing
- Risk portal
- Social Media Intelligence
Breaking down the cost of a cyber attack
Not all attacks cost in the millions like some of the high-profile ones, but regardless of the size…Read More
Immunity CANVAS leak: What you need to know
The leak of CANVAS v7.26 (released in September 2020) means that a wider pool of attackers—who gener…Read More
Double-extortion ransomware: Two different conside...
While information and digital security departments are starting to become increasingly familiar with…Read More
Ransomware attacks continue – as do ransom p...
Not a month goes by that we don’t see that another organisation has suffered a ransomware attack. In…Read More
Keeping an eye on COVID-19 cyber security risks
As the world deals with the COVID-19 pandemic, cyber security issues may have taken a backseat for b…Read More
Cyber breaches: People in glass houses shouldn’t t...
One of the issues highlighted by the Travelex incident—and the reaction to it—is the extraordinarily…Read More
How a hacker will access your network
Whether it’s customer data or intellectual property, that information is a business asset and, like…Read More
To hack back or not to hack back
The concept of a corporate organisation ‘hacking back’—i.e. retaliating against those who attack our…Read More
Are you ready to be hacked?
As scary as it sounds, once we accept that one day we will be attacked, it makes sense for us to be…Read More
Ransomware attacks highlight cyber hygiene shortco...
The ransomware, also known as WanaCryptOR or WCry, is based on a vulnerability that was patched by M…Read More