Risk Management and
Cybersecurity Blog
Do you enjoy our blog?
Why not subscribe to our monthly cybersecurity newsletter?
Subscribe now



New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965
Spring4Shell - a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
Read More



Phishing emails and what helps protect from spear phishing
What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...
Read More



Okta cyber security attack: Supply chain attacks on the rise
Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to ...
Read More



Mitigating cyberattacks with IOAs and IOCs
IOA and IOC - what's the difference and why you should pay attention to them Being able to mitigate cyberattacks ...
Read More



The Rise of Ransomware as a Service
Ransomware as a service - what is it and how to prevent it? Ransomware attacks have more than doubled in ...
Read More



Breaking down new SEC rules on cybersecurity risk management
What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Read More



Top 3 Ransomware Examples and what can we learn from them
Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose ...
Read More



New Spring4Shell vulnerability: CVE-2022-22963 and CVE-2022-22965
Spring4Shell - a new zero-day vulnerability which affects Spring users It’s the second critical bug that has been identified on ...
Read More
Read More



Phishing emails and what helps protect from spear phishing
What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or ...
Read More
Read More



Okta cyber security attack: Supply chain attacks on the rise
Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to ...
Read More
Read More



Mitigating cyberattacks with IOAs and IOCs
IOA and IOC - what's the difference and why you should pay attention to them Being able to mitigate cyberattacks ...
Read More
Read More



The Rise of Ransomware as a Service
Ransomware as a service - what is it and how to prevent it? Ransomware attacks have more than doubled in ...
Read More
Read More



Breaking down new SEC rules on cybersecurity risk management
What are the new SEC rules on cybersecurity risk management disclosure? The Securities and Exchange Commission (SEC) has introduced new ...
Read More
Read More



Top 3 Ransomware Examples and what can we learn from them
Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose ...
Read More
Read More