Risk Management and
Cybersecurity Blog

Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?

Subscribe now

Ransomware prevention: Top Security Tips

Ransomware prevention: Top Security Tips

Why ransomware prevention is so important Ransomware attacks are now commonplace. They’re evident in almost every industry and in every country ...
Importance of continuous control monitoring (CCM)

Importance of continuous control monitoring (CCM)

What is continuous control monitoring? Continuous control monitoring (CCM) is defined as using a set of technologies to reduce company losses ...
Why is cybersecurity important? Taking proactive cybersecurity measures

Why is cybersecurity important? Taking proactive cybersecurity measures.

What proactive cybersecurity measures you can take to protect your supply chain To understand why is cybersecurity important, we have ...
CyberSecurity business case with data insights

Making a cybersecurity business case with data-driven insights

Data-driven insights for cybersecurity business case Mitigating risks and avoiding cyberattacks should be a key corporate objective for any industry ...
cloud security posture management or CSPM

Why do you need a cloud security posture management (CSPM)?

What is cloud security posture management or CSPM? Cloud security posture management (CSPM) is a key element of cloud data ...
leveraging cybersecurity risk taxonomy

All you need to know about leveraging a cybersecurity risk taxonomy 

What is cyber risk taxonomy? A cybersecurity risk taxonomy is a tool that can identify risk vectors facing your organisation ...
New Spring4Shell vulnerability CVE-2022-22963 and CVE-2022-22965

New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965

Spring4Shell - a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
What helps protect from spear phishing emails scam

Phishing emails & ways to prevent spear phishing

What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...

Ransomware prevention: Top Security Tips

Ransomware prevention: Top Security Tips

Why ransomware prevention is so important Ransomware attacks are now commonplace. They’re evident in almost every industry and in every country ...
Importance of continuous control monitoring (CCM)

Importance of continuous control monitoring (CCM)

What is continuous control monitoring? Continuous control monitoring (CCM) is defined as using a set of technologies to reduce company losses ...
Why is cybersecurity important? Taking proactive cybersecurity measures

Why is cybersecurity important? Taking proactive cybersecurity measures.

What proactive cybersecurity measures you can take to protect your supply chain To understand why is cybersecurity important, we have ...
CyberSecurity business case with data insights

Making a cybersecurity business case with data-driven insights

Data-driven insights for cybersecurity business case Mitigating risks and avoiding cyberattacks should be a key corporate objective for any industry ...
cloud security posture management or CSPM

Why do you need a cloud security posture management (CSPM)?

What is cloud security posture management or CSPM? Cloud security posture management (CSPM) is a key element of cloud data ...
leveraging cybersecurity risk taxonomy

All you need to know about leveraging a cybersecurity risk taxonomy 

What is cyber risk taxonomy? A cybersecurity risk taxonomy is a tool that can identify risk vectors facing your organisation ...
New Spring4Shell vulnerability CVE-2022-22963 and CVE-2022-22965

New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965

Spring4Shell - a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
What helps protect from spear phishing emails scam

Phishing emails & ways to prevent spear phishing

What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...