Cybercrime Trends 2025: What three major reports reveal about the state of cybersecurity
This week, three of the most influential reports in cybersecurity were released; Google Cloud’s M-Trends,…
Read moreThis week, three of the most influential reports in cybersecurity were released; Google Cloud’s M-Trends,…
Read moreWant to download this article? Click here OT environments don’t behave like IT. That’s why…
Read moreWant to download this article? Click here Focus your energy on the controls that actually…
Read moreOver the past week, Barclays customers have had to manage severe disruptions to services provided by the bank in what has been described as an ‘IT glitch.’
Read moreIn the context of network security, firewalls provide a critical policing point between network segments,…
Read moreFor Chief Information Security Officers (CISOs), Information Security Officers (ISOs), and DPOs in some cases,…
Read moreGovernance: Building the foundations of trust Effective AI governance is crucial for managing risks associated…
Read moreExternal audit and certification ISO standards, such as ISO 42001, often necessitate external audits for certification.…
Read moreTypically, information security frameworks, standards and models can be seen as reactive, taking lessons from…
Read moreWhile growing up, my parents never owned a VCR player, so I had to go…
Read more