Articles
DurHack 2022
Once a year, in a building (not that) far away, hackers gather to compare their (not at all) malicious deeds.
ISO 27001 - time for a change
It's been almost 10 years since the last updates to the ISO 27001 standard, and while there's nothing significantly different there are some things to take note of...
Don’t buy more than you bargained for
The internet is the biggest retail park in the world and, despite originating in the US, Black Friday (and its counterpart Cyber Monday) has become the most anticipated shopping day* of the year…
Is your business prepared for a blackout?
Power outages and blackouts are rare in the UK, but you never know when a site may lose or reduce power.
Sport and cyber security
How can these things possibly be linked? A Sunday league kickabout, summer cricket tournaments and community netball matches aren’t strong candidates for a cyber threat, right? Wrong.
10 steps to achieving business continuity
According to ISO 22301, business continuity is defined as: ‘the capability of the organisation to continue delivery of products or services at acceptable predefined levels following disruptive…
Five key parts of the (secure) cycle of life
Secure SDLC is defined as the process of integrating security throughout the software development lifecycle, helping you catch issues in requirements before they manifest as security problems in…
Exercise your cyber security
Cyberattacks have continued to rise on three fronts; the number of attacks orchestrated, the level of sophistication demonstrated, and the impact inflicted.