Risk Management and
Cybersecurity Blog
Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?
Subscribe now



Log4j zero day vulnerability: How to protect yourself
The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete ...
Read More



Simple strategies for risk remediation in cyber security
Why remediation in cyber security is key to limiting the damage a breach can cause Remediation in cyber security refers ...
Read More



Open source security software risks
What is open source security? Open source software security is the measure of assurance in the freedom from the risk ...
Read More



Definition of impersonation – online safety
Definition of impersonation Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – ...
Read More



What is the impact of cyber security on procurement?
The procurement process needs additional technological resources to ensure appropriate risk mitigation Up-to-date procurement processes include various technologies in order ...
Read More



What are the cloud security challenges in 2022?
Taking a closer look at the main cloud security challenges, issues and threats found in 2022 As organisations right ...
Read More



What is SOC 2?
Why SOC 2 compliance is important for protecting sensitive data and building customer trust SOC 2 (Systems and Organisations ...
Read More



What is the real cost of a data breach?
Cyberattacks are on the rise. Hackers are well-funded, better organised, and more sophisticated in their methods. Not only are they ...
Read More



Log4j zero day vulnerability: How to protect yourself
The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete ...
Read More
Read More



Simple strategies for risk remediation in cyber security
Why remediation in cyber security is key to limiting the damage a breach can cause Remediation in cyber security refers ...
Read More
Read More



Open source security software risks
What is open source security? Open source software security is the measure of assurance in the freedom from the risk ...
Read More
Read More



Definition of impersonation – online safety
Definition of impersonation Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – ...
Read More
Read More



What is the impact of cyber security on procurement?
The procurement process needs additional technological resources to ensure appropriate risk mitigation Up-to-date procurement processes include various technologies in order ...
Read More
Read More



What are the cloud security challenges in 2022?
Taking a closer look at the main cloud security challenges, issues and threats found in 2022 As organisations right ...
Read More
Read More



What is SOC 2?
Why SOC 2 compliance is important for protecting sensitive data and building customer trust SOC 2 (Systems and Organisations ...
Read More
Read More



What is the real cost of a data breach?
Cyberattacks are on the rise. Hackers are well-funded, better organised, and more sophisticated in their methods. Not only are they ...
Read More
Read More