Skip to content

Consultancy (2)

Key findings from the DCMS Cyber Security Breaches Survey 2022

The UK government’s Department for Digital, Culture, Media and Sport (DCMS) has released its 2022 Cyber Security...

Successful Vulnerability Management: The Must-Know Vulnerabilities Your Business Needs to Fix

The Cybersecurity and Infrastructure Security Agency (CISA) in the US recently released its annual top routinely...

Cybersecurity Essentials for Cloud Environments

According to Statista, as of 2022, over 60% of all corporate data is stored in the cloud. This is up from just 30% in...

Examining the Follina and Confluence Vulnerabilities: Risks, Remediation, and Vulnerability Management

No single piece of software is perfect, and vulnerabilities are common; but when you consider that the average cost of...

Why Should ISO 27001 Be Central to Your Information Security Strategy?

Consumer data privacy has become a key priority for lawmakers across the globe. As a result, regulators are taking a...

Combating E-Commerce Data Skimming With PCI Standard v4.0

It’s been a relatively long time since the Security Standard Council released its last update: The Payment Card...

How Can Your Organization Stay Safe in the Age of Cyber Warfare?

The past decade has seen more than 500 large-scale, state-sponsored cyberattacks, and those are just the ones that have...