Articles
10 steps to achieving business continuity
According to ISO 22301, business continuity is defined as: ‘the capability of the organisation to continue delivery of products or services at acceptable predefined levels following disruptive…
Five key parts of the (secure) cycle of life
Secure SDLC is defined as the process of integrating security throughout the software development lifecycle, helping you catch issues in requirements before they manifest as security problems in…
Exercise your cyber security
Cyberattacks have continued to rise on three fronts; the number of attacks orchestrated, the level of sophistication demonstrated, and the impact inflicted.
Cyber Security for Critical National Infrastructure
Recent high-profile attacks on critical national infrastructure (CNI), such as Colonial Pipeline in 2020 and the Irish National Health Service in 2021, have underscored the serious threats posed…
Hacking for protection
Penetration testing is a process in which an organisation’s cyber security is put to the test by ethical hackers.
ISO27001 – worth it, or a pain in the annex?
Information security, cyber security and privacy protection remain high on the strategic agenda for most companies. ISO 27001 is changing. We find out how the new standard can help protect…
Protecting critical national infrastructure through cyber resilience
Operating within the UK’s 13 critical national infrastructure (CNI) sectors comes with a tremendous…
DEI: Naked Conversations - Podcast episode three
This is the third episode of our podcast, DEI: Naked Conversations, and here Daniel, our Associate Director for Digital and Data, chats to DEI consultant Janet Houlis about his journey with the…