Research Posts

reliance cyber firewall logging booklet

Thought Leadership: Firewall Logging

In the context of network security, firewalls provide a critical policing point between network segments,…

Read more
Reliance Cyber Ai background - coloured moving dots on a nvy background

Navigating the AI governance landscape: Implementing ISO 42001 for responsible AI management

For Chief Information Security Officers (CISOs), Information Security Officers (ISOs), and DPOs in some cases,…

Read more
Reliance Cyber Ai background - coloured moving dots on a nvy background

Navigating the AI governance landscape: NIST risk management insights

Governance: Building the foundations of trust Effective AI governance is crucial for managing risks associated…

Read more
Reliance Cyber Ai background - coloured moving dots on a nvy background

Navigating the AI governance landscape: Key differences between ISO and NIST for AI

External audit and certification ISO standards, such as ISO 42001, often necessitate external audits for certification.…

Read more
Reliance Cyber Ai background - coloured moving dots on a nvy background

Managing AI risks with ISO 27001

Typically, information security frameworks, standards and models can be seen as reactive, taking lessons from…

Read more
reliance cyber security monument valley

The Good, the Bad and the Ugly: 2024 Edition “Cybersecurity Complexity”

While growing up, my parents never owned a VCR player, so I had to go…

Read more
Thought Leadership article on grey background

Unpopular opinion: In defence of compliance

By Chris Martin, Information Security GRC Manager Compliance is not a silver bullet, but it is…

Read more
CSM importance in MSSP ebook header image

Thought leadership: The critical role of customer success and partnership in the MSSP sector

Facts don’t care about your feelings, but your sense of security does. In today’s dynamic…

Read more
why pipa matters in data privacy ebook graphic

Thought leadership: Why PIPA matters – Lessons from global data privacy regulation and enforcement

PIPA – a new dawn for Data Privacy in Bermuda Though the genesis of data…

Read more
A close-up of a dandelion with seeds, showcasing the delicate beauty of nature's dispersal mechanism.

Critical security bulletin: Palo Alto Networks Vulnerability PAN-SA-2024-0015

Discover how to protect your business from the growing threat of fake invoice scams.

Read more

Book your free 30-minute cyber security consultation