July 7, 2020

Passwords are hard and you are busy, so putting additional layers of security between you and your business systems can feel really annoying, particularly when ...

Read More

July 3, 2020

You may have already asked yourself ‘How to implement a VRM programme?’ Here you will find out how to implement it quickly. An effective VRM programme ...

Read More

June 17, 2020

Privacy is an ever growing priority for managing the risk posture of an organisation. The increase in legislation and regulation globally is a good thing ...

Read More

June 11, 2020

We wrote recently The OSINT approach to Vendor Risk management about how Open Source Intelligence (OSINT) enables a client within a vendor risk management (VRM) programme to ...

Read More

June 11, 2020

Vendor Risk Management is extremely important as we are in an environment where third-party relationships are becoming more complex, supply chains are expanding not just ...

Read More

June 4, 2020

There are an increasing number of complex relationships between companies and third parties to whom they outsource services. These can range from outsourcing entire functions, such as tax, ...

Read More

June 1, 2020

A "drive-by cyber attack" or "drive-by download" is now a very popular technique among hackers and bad actors designed to instal malware on an unsuspecting ...

Read More

March 25, 2020

The first principle of good security starts from putting in controls to stop bad things happening, to stop malicious individuals from doing bad things. It ...

Read More

March 23, 2020

Incident Response is counter intuitive for a number of reasons: It is the tool in your InfoSec armoury whose value you can really only demonstrate after ...

Read More