Skip to content

Consultancy

DORA: The Digital Operational Resilience Act

What is DORA? The Digital Operational Resilience Act is a European framework that establishes a uniform approach...

How CSA Empowers Organizations in Transitioning to PCI DSS Version 4 Compliance

It’s time for your organization to take action and transition to PCI DSS v4.0 Compliance. The Payment Card Industry...

The Vital Role of Incident Response Testing in Organizations’ Security

Do you take your security seriously? In this blog, you’ll learn why incident response testing is vital to your...

The Benefits of Combining your ISMS Program with a Penetration Testing Cycle

What is an ISMS program? The NCSC defines penetration testing as “A method for gaining assurance in the security of an...

PCI DSS v4.0 – Where are we now?

The long-awaited latest iteration of the Payment Card Industry (PCI) Data Security Standard (DSS) is here! What is PCI...

Enterprise Architecture and Its Role Against Security Threats

Last year, Gartner forecast that worldwide spending on security and risk management would soon exceed $150 billion, a...

Cyber Threat Briefing: An Organization’s Susceptibility to Supply Chain Attacks

In a new report published by the World Economic Forum, entitled Global Cybersecurity Outlook 2022, more than 40% of...

Cybersecurity Maturity Model Certification (CMMC): What, How, When and Why?

For almost two years now, the US Department of Defense (DOD) has been reviewing a process designed to ensure defense...

The Changing Compliance Landscape: Preparing for PCI DSS v4.0

Organizations’ compliance programs have had to evolve over recent years to incorporate new ways of working, new...

What is the Strengthening American Cybersecurity Act and what do I need to know?

Since the Biden administration took office in the US, cybersecurity has been a top government priority. Major cyber...

A brief insight into the responsibilities of an Information Security Manager (ISM)

Information security is a very broad field. It spans across misuse of enterprise information, disruption, unauthorised...

PCI DSS v4.0: The Customized Approach

Organizations needing to comply with the Payment Card Industry Data Security Standard (PCI DSS) will already be...

Optimizing PCI DSS Compliance: The Role of INFI in Continuous Compliance Improvement

As the world transitions to PCI DSS v4.0, both enterprises and assessors are adjusting their operational strategies to...

Common PCI DSS Mistakes

When it comes to the Payment Card Industry Data Security Standard (PCI DSS), there are common mistakes that every QSA...

Practical Steps to Embedding and Measuring Continuous Compliance

Trying to stay fully compliant today can be like trying to hit a moving target. The regulatory landscape is now...

Everything You Need To Know About CMMC 2.0

In a recent online briefing, SureCloud’s Risk Advisory Senior Director, Craig Moores, sat down with Senior Consultant...

Cyber Threat Briefing: Assessing the Russian Cyber Threat Landscape

For some years now, geopolitical conflicts have been as much about bits and bytes as they have boots and bullets. The...

Cyber Essentials Evendine Question Set

IASME is bringing in a new question set and marking scheme for 2022. These changes will affect both Cyber Essentials...

Key findings from the DCMS Cyber Security Breaches Survey 2022

The UK government’s Department for Digital, Culture, Media and Sport (DCMS) has released its 2022 Cyber Security...

Successful Vulnerability Management: The Must-Know Vulnerabilities Your Business Needs to Fix

The Cybersecurity and Infrastructure Security Agency (CISA) in the US recently released its annual top routinely...

Cybersecurity Essentials for Cloud Environments

According to Statista, as of 2022, over 60% of all corporate data is stored in the cloud. This is up from just 30% in...