top of page
Articles
Some light reading on cyber security, data protection and resilience


The G7 PQC Roadmap: Why Financial Services Must Act Now on Quantum Risk
by Ben de la Salle The G7’s coordinated roadmap for post-quantum cryptography (PQC) migration is a defining moment for financial services. This isn’t a technical bulletin for IT teams. It’s a strategic directive aimed at finance ministries, central banks, regulators, and systemically important institutions. The message is straightforward: migration will take years, and the work must start now. From technical debate to board-level obligation What distinguishes this roadmap fr
Jan 153 min read


Crypto-Agility: The Essential Aspect of Post-Quantum Cryptography
Crypto-agility is the foundation of a safe, phased move to post-quantum cryptography. Here’s how the NCSC’s UK roadmap to 2035 translates into practical steps—plus how ICA Consultancy’s Cryptgility services support awareness, governance and readiness.
Jan 132 min read


Cyber Security Trends for 2026
Cyber security trends for 2026: AI arms race, deepfakes, quantum‑safe cryptography, cloud concentration risk, tightening regulations (NIS2, DORA), nation‑state threats and evolving ransomware. Practical actions for CIOs, CISOs and CROs to build resilience.
Dec 29, 20254 min read


Post-Quantum Cryptography (PQC) FAQ: Protecting Your Business in the Dawn of Quantum Computing
This FAQ explains what PQC is, why it matters now, and how your business can prepare, while also addressing key regulatory expectations and steps for building future-proof resilience.
Dec 12, 20254 min read


Santa’s Holiday Cybersecurity: Incident Response & Tips
Discover Santa’s hilarious yet practical cybersecurity tips for the holidays—phishing, data breaches, and incident response made festive!
Dec 11, 20253 min read


How to Select the Right Managed Detection and Response (MDR) Provider: A Practical Guide for RFP Success
Learn how to choose the right Managed Detection and Response (MDR) provider with our practical guide. Enhance your RFP success with MDR insights.
Sep 8, 20253 min read


CISOaaS: The Flexible Solution for Growing Businesses
Why Security Leadership Matters, Even If You’re Not a Big Enterprise Cyber threats don’t discriminate by company size. Whether you’re a...
Sep 3, 20253 min read


Celebrating 8 Years of Client-Centric Cyber Security at ICA Consultancy
As ICA Consultancy marks 8 years of delivering client-centric cyber security services, we’re proud to reflect on a year of growth, innovation, and lasting partnerships. Over the past 12 months, we’ve continued to strengthen our position as a trusted advisor in cyber security and data protection, supporting organisations across financial services, legal, private equity, healthcare, education, and beyond.
Sep 2, 20252 min read


Unlocking Strategic Growth through Managed Security Awareness (Culture360°)
Learn how Managed Security Awareness can help you improve your security culture, free up your resources and support your strategic growth
Aug 18, 20253 min read


Why Crisis Simulations Matter: Preparing for Security Incidents
Cyber incidents like ransomware and data breaches can disrupt any business. Preparation isn’t just about technology, it’s about making...
Aug 6, 20253 min read


Security Risk Management Terminology
Security risk management is more than a compliance activity. It’s the foundation for protecting your organisation from disruption and...
Jul 28, 20254 min read


Third-Party Security Risk Management
Third-party risk is a strategic business issue. Organisations are becoming increasingly dependent on external partners, vendors, and...
Jul 18, 20253 min read


Securing Your Startup: Simple Steps to Build Strong Cyber Foundations
Cyber security is often seen as a problem for large enterprises. But for startups and scale-ups, the risks are just as real, and the impact of an attack can be devastating. Investors and customers expect robust protection, even from small teams. The good news: you don’t need a huge budget to make a real difference.
Jul 7, 20255 min read


Artificial Intelligence: Security, Privacy and Resilience Risks
Organisations are embracing Artificial Intelligence (AI) to drive efficiency and innovation, but as adoption grows, so do the risks.
Jun 27, 20254 min read


Post-Quantum Cryptography: Why you need to do something about it now
Let’s face it: mention “quantum” and most people either think of science fiction or switch off entirely; However, quantum computing is moving from theory to reality. While the term “Post-Quantum Cryptography” may sound intimidating, the risks and opportunities, are practical and immediate for anyone responsible for data, privacy, and resilience.
Jun 10, 20253 min read


Continuous Control Monitoring: The Key to Efficient Risk Management and Seamless Compliance
Traditional compliance approaches are time-consuming, reactive, and disruptive to business as usual. Enter Continuous Control Monitoring (CCM): a modern, automated approach that transforms compliance and risk management from a box-ticking exercise, often point-in-time, into a real-time strategic advantage.
May 28, 20253 min read


The Role of the Fractional CISO: Bridging the Gap in Cyber Security Leadership
In today’s fast-evolving threat and regulatory landscape, the Fractional CISO is a solid choice for many organisations
Mar 25, 20256 min read


Unlocking Your Cyber Security Potential: The Power of Maturity Assessments
Understanding where your organisation stands in terms of cyber security is not just important — it’s essential. A Cyber Security Maturity...
Mar 24, 20253 min read


Ben de la Salle Recognised in 2&20's Top 100 List for the Fourth Year
Ben de la Salle, CEO & founder, recognised in 2&20's prestigious list of Top 100 Most Influential People 2025
Mar 5, 20251 min read


Twelve Frauds of Christmas
Staying vigilant and informed will help you enjoy a safe and joyous festive period. Have a very Merry Christmas and a Happy New Year
Dec 10, 20246 min read


Personal Cyber Security Checklist
It is Cyber Security Awareness Month, and the October 30th is National Checklist Day! Download our FREE Personal Cyber Security Checklist
Oct 28, 20241 min read


Clean Your Virtual Desktop Day
National Clean Your Virtual Desktop Day is an opportunity to declutter your computer's desktop, and improve productivity
Oct 21, 20242 min read


Cyber Security and Sustainability
Improper management of E-Waste can lead to data breaches, significant impacts on our environment, and, potentially, regulatory fines
Oct 14, 20242 min read


Cyber Security and Mental Health
Cyber Security and Mental Health is closely linked. Cyber security is demanding and fast-paced, with constant threats and challenges.
Oct 7, 20243 min read
bottom of page
