top of page
Articles
Some light reading on cyber security, data protection and resilience


Cyber Security Trends for 2026
Cyber security trends for 2026: AI arms race, deepfakes, quantum‑safe cryptography, cloud concentration risk, tightening regulations (NIS2, DORA), nation‑state threats and evolving ransomware. Practical actions for CIOs, CISOs and CROs to build resilience.
Dec 29, 20254 min read


Post-Quantum Cryptography (PQC) FAQ: Protecting Your Business in the Dawn of Quantum Computing
This FAQ explains what PQC is, why it matters now, and how your business can prepare, while also addressing key regulatory expectations and steps for building future-proof resilience.
Dec 12, 20254 min read


Unlocking Strategic Growth through Managed Security Awareness (Culture360°)
Learn how Managed Security Awareness can help you improve your security culture, free up your resources and support your strategic growth
Aug 18, 20253 min read


Why Crisis Simulations Matter: Preparing for Security Incidents
Cyber incidents like ransomware and data breaches can disrupt any business. Preparation isn’t just about technology, it’s about making...
Aug 6, 20253 min read


Third-Party Security Risk Management
Third-party risk is a strategic business issue. Organisations are becoming increasingly dependent on external partners, vendors, and...
Jul 18, 20253 min read


Artificial Intelligence: Security, Privacy and Resilience Risks
Organisations are embracing Artificial Intelligence (AI) to drive efficiency and innovation, but as adoption grows, so do the risks.
Jun 27, 20254 min read


Continuous Control Monitoring: The Key to Efficient Risk Management and Seamless Compliance
Traditional compliance approaches are time-consuming, reactive, and disruptive to business as usual. Enter Continuous Control Monitoring (CCM): a modern, automated approach that transforms compliance and risk management from a box-ticking exercise, often point-in-time, into a real-time strategic advantage.
May 28, 20253 min read


What is a RoPA?
Record of Processing Activities is a requirement of data protection laws that organisations must record all their processing activities
May 8, 20232 min read


Performing a DPIA
A Data Protection Impact Assessment is a process used to identify and assess the potential risks associated with the use of personal data
May 1, 20232 min read


Responding to a DSAR
Data Subject Access Requests are requests made by individuals for access to personal data that an organisation holds about them.
Apr 24, 20232 min read


Complying with Privacy Laws
Compliance with data protection laws can be a complex process, but there are steps that organisations can take to become and stay compliant.
Apr 17, 20233 min read


Why you should Classify your Data
Classifying data, and information, is an essential step for organisations to understand and protect their sensitive information.
Apr 3, 20233 min read
bottom of page
