There has been big waves in the UK regarding data protection yesterday; the government revealed two significant announcements that may drastically change the UK’s privacy posture in the years to come. Here’s a quick rundown of the announcements and what they might mean for the future of the UK’s data protection and privacy laws. Culture […]
Cyber security awareness deals with the amount of knowledge that end-users have about cyber security threats and how to implement cyber security best practice to mitigate those threats. End-users are typically regarded as the weak links in an organisation, and hackers usually target vulnerable individuals. With that being said, cyber awareness has become more important than ever […]
As businesses around the globe are more reliant on technology than ever before, the threat of cyber-attacks has become more increasingly prevalent. Every business should have cybersecurity measures in place to defend their networks, systems, and applications from being infiltrated. Considering this, businesses need to make provisions for cyber breaches, detection, and response to provide […]
The cyber insurance market is still relatively in its infancy. The first policies were introduced in the early 90s with the onset of the internet, and it had quite a slow take-off. This was most likely due to a lack of perceived risk. With the explosion of technology, cyber-attacks increased, but cyber insurance probably only […]
In this podcast, David and Brad interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years.
David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.
The average system pen test is not a complete replication of an actual cyber-attack. However, red teaming is. Learn more about red, blue and purple teaming.
Red teaming is an aggressive form of penetration testing, blue teaming is more defensive and purple teaming is a joint red and blue test.
The pillars of cybersecurity are confidentiality, integrity and availability of data. It is all about data security and protection.
A one-size-fits-all approach does not work when it comes to risk. Every organisation is different. Every organisation is different. And that is why a risk assessment should be completed upfront. You have to make sure that you identify the impact and likelihood of the worst problems taking place, so that you can assess the effort […]