Risk Management and
Cybersecurity Blog
Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?
Subscribe now
What is a common indicator of a phishing attempt?
A phishing attack is a social engineering method where an attacker sends a fraudulent email or message designed to trick ...
Ransomware prevention: Top Security Tips
Why ransomware prevention is so important Ransomware attacks are now commonplace. They’re evident in almost every industry and in every country ...
Importance of continuous control monitoring (CCM)
What is continuous control monitoring? Continuous control monitoring (CCM) is defined as using a set of technologies to reduce company losses ...
Why is cybersecurity important? Taking proactive cybersecurity measures.
What proactive cybersecurity measures you can take to protect your supply chain To understand why is cybersecurity important, we have ...
Making a cybersecurity business case with data-driven insights
Data-driven insights for cybersecurity business case Mitigating risks and avoiding cyberattacks should be a key corporate objective for any industry ...
Why do you need a cloud security posture management (CSPM)?
What is cloud security posture management or CSPM? Cloud security posture management (CSPM) is a key element of cloud data ...
All you need to know about leveraging a cybersecurity risk taxonomy
What is cyber risk taxonomy? A cybersecurity risk taxonomy is a tool that can identify risk vectors facing your organisation ...
New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965
Spring4Shell - a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
Phishing emails & ways to prevent spear phishing
What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...
What is a common indicator of a phishing attempt?
A phishing attack is a social engineering method where an attacker sends a fraudulent email or message designed to trick ...
Ransomware prevention: Top Security Tips
Why ransomware prevention is so important Ransomware attacks are now commonplace. They’re evident in almost every industry and in every country ...
Importance of continuous control monitoring (CCM)
What is continuous control monitoring? Continuous control monitoring (CCM) is defined as using a set of technologies to reduce company losses ...
Why is cybersecurity important? Taking proactive cybersecurity measures.
What proactive cybersecurity measures you can take to protect your supply chain To understand why is cybersecurity important, we have ...
Making a cybersecurity business case with data-driven insights
Data-driven insights for cybersecurity business case Mitigating risks and avoiding cyberattacks should be a key corporate objective for any industry ...
Why do you need a cloud security posture management (CSPM)?
What is cloud security posture management or CSPM? Cloud security posture management (CSPM) is a key element of cloud data ...
All you need to know about leveraging a cybersecurity risk taxonomy
What is cyber risk taxonomy? A cybersecurity risk taxonomy is a tool that can identify risk vectors facing your organisation ...
New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965
Spring4Shell - a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
Phishing emails & ways to prevent spear phishing
What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...