Latest Posts
The Biggest Cybersecurity Threat Isn’t Who You Think It Is
Your organisation’s greatest security risk isn’t a shadowy hacker in a hoodie – it’s the well-meaning employee who shares passwords to meet a project deadline, uses Dropbox because the approved file-sharing system is too slow, or clicks on a phishing email from what appears to be a trusted colleague.
This uncomfortable reality emerged as the central theme in our recent webinar, “Hiding in Plain Sight: The Cyber Risks Built Into Your Daily Operations,” where I joined fellow cybersecurity experts Petra Vincent and Matthew Wylie to dissect how everyday business practices create the vulnerabilities that attackers exploit most successfully.
MFA Isn’t Enough: Real Stories from the Frontlines
Cybersecurity is about minimizing risk. But as leaders, we need to ask ourselves the harder question: are we building systems that hold up when people
The Cyber Governance Code of Practice, Broken Down
Cyber governance is no longer a “nice to have”. It’s a board-level imperative.
The UK’s new Cyber Governance Code of Practice outlines the minimum standards that regulators, clients, and insurers expect from boardrooms in medium and large organisations.
This Code shifts cyber from IT’s responsibility to the board’s. If you’re a COO, compliance lead, or board member, this applies to you now.
What the UK’s New Software Security Code Really Means
If you sell or build software in the UK, you’ve just been handed a new benchmark to hit.
The Department for Science, Innovation and Technology (DSIT) has introduced a new Software Security Code of Practice. It’s voluntary—for now—but if you’re a CTO, CISO or technical leader in a SaaS business, vendor firm, or IoT provider, it’s already showing up in audits and RFPs.
Best Practices for Effective Intrusion Detection and Prevention
In today’s cybersecurity landscape, organisations face an increasing number of sophisticated threats targeting their networks, systems, and sensitive data. Cybercriminals employ advanced techniques to exploit
How Does Endpoint Security Work? Protecting Devices from Cyber Threats
Remote work and cloud based operations have become the norm for a variety of businesses in a variety of sectors. This means that employees are
What is Spear Phishing in Cyber Security? How to Recognise and Prevent Attacks
We live in the digital era and with this in mind, cyber threats are no longer random or indiscriminate. They are growing everyday, becoming more
What is Security Information and Event Management (SIEM)?
We live in the digital age and with this surge in technological advancement, organisations are facing ever growing cyber threats. The complexity and rise of
How to Prevent Ransomware Attacks and Keep Your Data Safe
In the digital age, ransomware attacks have become one of the most insidious threats to organisations and individuals. These malicious software programs are designed to