Our Blogs

The Future of Authentication

The Future of Authentication

The Future of AuthenticationDo you have a complicated relationship with passwords? Maybe you are fine with them and personally follow...
Read More
Defining and Mitigating Cybersecurity Risk

Defining and Mitigating Cybersecurity Risk

Defining and Mitigating Cybersecurity RiskCyber threats show no signs of diminishing. For leaders in businesses and other organisations, it is...
Read More
Ransomware Protection – What You Need To Do

Ransomware Protection – What You Need To Do

Ransomware Protection - What You Need To DoAs business decision-makers, it’s vital to recognise that the cyber threat from ransomware...
Read More
Empowering Your Workforce to Stay Safe from the Threat of Phishing Attacks

Empowering Your Workforce to Stay Safe from the Threat of Phishing Attacks

Empowering Your Workforce to Stay Safe From the Threat of Phishing AttacksIn today’s digital landscape, cybersecurity is more important than...
Read More
The 2024 Cybersecurity Threat Landscape

The 2024 Cybersecurity Threat Landscape

The 2024 Cybersecurity Threat LandscapeIn recent years, there has been a significant rise in cyberattacks against organisations of all sizes,...
Read More
MITRE ATT&CK Framework – What’s That Then?

MITRE ATT&CK Framework – What’s That Then?

MITRE ATT&CK Framework - What's That Then?The cybersecurity threat landscape constantly changes as cybercriminals use increasingly sophisticated attack methods. It...
Read More
Business Risk – What are Industry Analysts Saying?

Business Risk – What are Industry Analysts Saying?

Business Risk - What are Industry Analysts Saying?Business risk comes up a lot in business and technical articles on the...
Read More
Should Businesses Create an AUP for Generative AI?

Should Businesses Create an AUP for Generative AI?

Should Businesses Create an AUP for Generative AI?In a recent article titled Generative AI Growth and Cybersecurity, Resham Ganglani, CEO at...
Read More
Building a Blended Cybersecurity Defence

Building a Blended Cybersecurity Defence

Building a Blended Cybersecurity DefenceIDC recently released results from Wave 2 of their 2023 Future Enterprise Resiliency and Spending (FERS)...
Read More
Generative AI Growth and Cybersecurity

Generative AI Growth and Cybersecurity

Generative AI Growth & Cybersecurity  Throughout this year, there has been much buzz surrounding generative AI tools such as OpenAI...
Read More
Risk Management While Enabling Business Growth

Risk Management While Enabling Business Growth

Risk Management While Enabling Business Growth  Boards of Directors overseeing many businesses like to stress that they encourage operations that...
Read More
The Cybersecurity Landscape in 2023-2024

The Cybersecurity Landscape in 2023-2024

The Cybersecurity Landscape in 2023-24  The threat from cyberattacks has increased over the last few years, and this trend shows...
Read More
Don’t Ignore Insider Threats

Don’t Ignore Insider Threats

Don't Ignore Insider Threats  There is an understandable and necessary focus on cybersecurity threats from external bad actors. But the...
Read More
Why Enterprises Need to Take a Holistic Approach to Third Party Risk Management

Why Enterprises Need to Take a Holistic Approach to Third Party Risk Management

Why Enterprises Need to Take a Holistic Approach to Third Party Risk ManagementThere is a fine line in a grey...
Read More
Opening the Door to Zero Trust Network Access

Opening the Door to Zero Trust Network Access

Opening the Door to Zero Trust Network AccessZero Trust Network Access (ZTNA) provides secure remote connectivity to applications and data...
Read More
Five DLP Drawbacks to Watch Out For

Five DLP Drawbacks to Watch Out For

Five DLP Drawbacks to Watch Out For September is Insider Threat Awareness Month. It marks the growing emphasis enterprises and...
Read More
Insider Threats: What’s Holding Enterprises Back?

Insider Threats: What’s Holding Enterprises Back?

Insider Threats: What’s Holding Enterprises Back?Enterprise security involves both external and internal threats. Enterprises however, typically focus on external threats....
Read More
Insider Threats: A Growing Concern for Enterprise IT Security

Insider Threats: A Growing Concern for Enterprise IT Security

Insider Threats: A Growing Concern for Enterprise IT SecurityInsider threats are those posed by internal actors who abuse their trusted...
Read More