Our place for thought sharing, question answering and news announcing.
A high-level guide on why and, most importantly, how to securely deploy software of all kinds. We give you a high-level ruleset that can be applied to everything from SaaS applications to ERP modules.
See moreThis article is a comprehensive guide designed to help you understand why you should test your organisation’s ransomware protection, how testing happens, and how to make the case for ransomware resilience testing in your organisation.
See moreWhat is TBEST, and does your telecoms firm need it? We break down how the OFCOM-overseen framework works and what to expect from testing.
See moreWhat should you actually do once the red exercise is over and you're holding the results? We asked our cybersecurity consulting team for their advice.
See moreHow do you successfully implement a cybersecurity framework (any framework) in an organisation? We asked our cybersecurity consulting team. Here's what they said.
See moreWhether you lead, work for, or invest in a company early in its cybersecurity journey, this article will help you understand the what, why, and when of cybersecurity frameworks.
See moreThank you!
Please try again later.