Skip to main content
Andrew Buckingham
Written byAndrew Buckingham

DurHack 2022

Once a year, in a building (not that) far away, hackers gather to compare their (not at all) malicious deeds.

Simon Evans
Written bySimon Evans
Cyber Essentials and ISO 27001

ISO 27001 - time for a change

It's been almost 10 years since the last updates to the ISO 27001 standard, and while there's nothing significantly different there are some things to take note of...

Headshot
Cyber Resilience, Cyber Security Strategy, Data Protection and GDPR

Don’t buy more than you bargained for

The internet is the biggest retail park in the world and, despite originating in the US, Black Friday (and its counterpart Cyber Monday) has become the most anticipated shopping day* of the year…

Mike Pemberton
Written byMike Pemberton
Technology Consulting, Business Consulting, Business Resilience, Project Management

Is your business prepared for a blackout?

Power outages and blackouts are rare in the UK, but you never know when a site may lose or reduce power. 

Picture of Scott
Cyber Resilience, Cyber Security Strategy, Cyber Essentials and ISO 27001

Sport and cyber security

How can these things possibly be linked? A Sunday league kickabout, summer cricket tournaments and community netball matches aren’t strong candidates for a cyber threat, right? Wrong.

Michael Headshot
Cyber Resilience, Cyber Security Strategy

10 steps to achieving business continuity

According to ISO 22301, business continuity is defined as: ‘the capability of the organisation to continue delivery of products or services at acceptable predefined levels following disruptive…

Shashank Headshot
Written byShashank Patwardhan
Bespoke Software, Software Delivery & Consultancy, Cyber Resilience

Five key parts of the (secure) cycle of life

Secure SDLC is defined as the process of integrating security throughout the software development lifecycle, helping you catch issues in requirements before they manifest as security problems in…

Sean Headshot
Written bySean-Francis Brown
Cyber Resilience, Cyber Security Strategy

Exercise your cyber security

Cyberattacks have continued to rise on three fronts; the number of attacks orchestrated, the level of sophistication demonstrated, and the impact inflicted.