The Ransomware Ecosystem: RaaS, Extortion and the Impact on Your Business

The Ransomware Ecosystem:  RaaS, Extortion and the Impact on Your Business   “Ransomware continues to be the most significant, serious and organised cyber crime threat faced by the UK.” – James...

2919 Cyber Resilience, November 16, 2023
What are the Different Types of Penetration Testing?

What are the Different Types of Penetration Testing? Penetration testing, which can also be known as pen testing, is a process that...

2831 Cyber Resilience, September 26, 2023
Podcast | The Myriad of Detection and Response Acronyms

The Myriad of Detection and Response Acronyms   Right now, there’s a lot of buzz in the security industry around detection and response...

2711 Cyber Resilience, July 7, 2023
The Benefits Of Outsourcing Your Cyber Security

The Benefits Of Outsourcing Your Cyber Security The past few years have seen a shift in attitudes towards the importance of cyber...

453 Cyber Resilience, July 14, 2022
The Cyber Attack Stages Explained | Board Edition

The Cyber Attack Stages Explained | Board Edition Within the cyber security industry, there are varying models explaining the stages of a...

Is Passwordless Feasible or Aspirational?

Is Passwordless Feasible or Aspirational? Microsoft is just one example of a brand that has been talking about going ‘passwordless’ for many...

726 Cyber Resilience, April 6, 2021
Cyber Security for the Cloud

Cyber Security for the Cloud Friday 27th September 2019 – Imperial War Museum North, 10am – 2pm Join us for an exclusive,...

761 Cyber Resilience, September 19, 2019
What’s your cyber security strategy for 2018?

What's your cyber security strategy for 2018? In the link below, you can find some very interesting insights in to the current...

772 Cyber Resilience, February 25, 2018