News & Insights
- Capacity Building
- Cyber attack
- Cyber security
- Data protection
- Digital Threat Digest
- Geopolitical Risk
- Incident Response
- Information security
- ISO 27001
- PCI DSS
- Penetration testing
- Risk portal
- Social Media Intelligence
The importance of Business Continuity and Resilien...
Recently, the Ministry of Defence released an ‘Industry Security Notice‘ to “remind readers of the i…Read More
PCI DSS v4.0: What you need to know
Paul Traill, Head of Risk and Compliance In March 2022, the PCI DSS Security Standards Council launc…Read More
How to mitigate third-party digital risk
Every organisation is facing digital risks; whether that’s criminal-led (the most common), state-led…Read More
What Is ISO 27002 and why does your business need ...
The International Organization for Standardization (ISO) recently released an update to the ISO/IEC…Read More
Why choose ISO 27001 over other information securi...
ISO 27001 is one of the best known and most recognised internationally agreed set of standards for t…Read More
What’s the point of a cyber security maturity asse...
Dr Meredith Patton, Director of Cyber Operations with Keith Buzzard, Chief Technology Officer At wor…Read More
5 ISO 27001 myths that make the Standard seem expe...
Here are the 5 ISO 27001 myths stopping organisations getting the most from the Standard, that our H…Read More
The challenges of PCI DSS compliance
Instead of regarding PCI DSS as an overhead to be avoided, organisations should regard it as a valua…Read More
Twittergate: This time you can’t blame technology
Cyber attacks aren't always as simple as a technological failing, human error is a large element of…Read More
The importance of Identity and Access Management
A robust IAM process is a crucial part of any information security management system—it ensures a us…Read More