Blogs

Home Blogs


Image

ChatGPT: A double-edged sword?

A recent report claims that artificial intelligence models could boost global GDP by 7%. However, Elon Musk has called for a six-month halt in testing amid fears of a threat to humanity.

Image

Are Security Leaders On The Ropes and Ready to Quit?

CISOs are stressed out and are looking to quit as workplace stress impacts staff health, retention and security programmes. This article examines the pressures and what can be done.

Image

Managing Cybersecurity with Reduced Teams

Cybersecurity has never been more important, yet teams and budgets are shrinking. More risk, fewer resources - so how can you protect your organisation for less?

Image

Preparing your Organisation for Secure Remote Working

March 2020 saw reams of businesses close their physical doors and retreat to the safety of remote working, the extent of the remote working requirement presents new challenges to the safety and...

Image

Is Your Rapidly Deployed Mobile Application Secure?

Social and business interaction is dramatically changing. Service-based organisations will need to find a way of operating and keeping employees and customers at a safe distance. Mobile...

Image

Preparing for Cyber Warfare – Why you need a simulation tool

The cyber landscape continues to be a challenging place for public and private organisations alike. Both are often on the back foot when it comes to fending off intelligent, determined and motivated...

Image

Information Security & Privacy – It’s not my bag baby, or is it?

I am imagining a time in the not too distant future (actually it’s here already) where post security breach board meetings play out like a scene from an Austin (Danger) Powers movie...

Image

Risk Assessments – Something to believe in

Through good judgement and perhaps contractual or regulatory obligation, organsations are increasingly turning to formal Risk Assessments to understand the risks associated with the data they store...

Image

Governance – Save me from the angry mob

Understanding information risk is a great basis for identifying how many or few security measures should be adopted compared to a belt and braces approach...


Image

Embedding Security – Fingers crossed or part of a plan?

I often meet IT teams during their implementation of information security standards, in what feels like Groundhog Day repetition...


Image

Data – Be clear on what you are protecting it from

When cyber-attack stories hit the news they invariably talk about exposures of confidential information, however when considering what security measures to deploy, leaders of organisations must think beyond...

Image

CIS0 – The what, how much and will they stay

The demand for Chief Information Security Officers (CISOs) is outstripping the availability of experienced professionals in a big way and is likely to do so for some considerable time...

Image

Security Spend – How much is enough?

Some of the best leaders I’ve met actively seek knowledge and insights to help inform decisions. They also like to make comparisons with others in the same market or of a similar size to bring relevant context to their decisions...