top of page
Articles
Some light reading on cyber security, data protection and resilience


Cyber Security Trends for 2026
Cyber security trends for 2026: AI arms race, deepfakes, quantum‑safe cryptography, cloud concentration risk, tightening regulations (NIS2, DORA), nation‑state threats and evolving ransomware. Practical actions for CIOs, CISOs and CROs to build resilience.
Dec 29, 20254 min read


Post-Quantum Cryptography (PQC) FAQ: Protecting Your Business in the Dawn of Quantum Computing
This FAQ explains what PQC is, why it matters now, and how your business can prepare, while also addressing key regulatory expectations and steps for building future-proof resilience.
Dec 12, 20254 min read


Unlocking Strategic Growth through Managed Security Awareness (Culture360°)
Learn how Managed Security Awareness can help you improve your security culture, free up your resources and support your strategic growth
Aug 18, 20253 min read


Why Crisis Simulations Matter: Preparing for Security Incidents
Cyber incidents like ransomware and data breaches can disrupt any business. Preparation isn’t just about technology, it’s about making...
Aug 6, 20253 min read


Third-Party Security Risk Management
Third-party risk is a strategic business issue. Organisations are becoming increasingly dependent on external partners, vendors, and...
Jul 18, 20253 min read


Artificial Intelligence: Security, Privacy and Resilience Risks
Organisations are embracing Artificial Intelligence (AI) to drive efficiency and innovation, but as adoption grows, so do the risks.
Jun 27, 20254 min read


Continuous Control Monitoring: The Key to Efficient Risk Management and Seamless Compliance
Traditional compliance approaches are time-consuming, reactive, and disruptive to business as usual. Enter Continuous Control Monitoring (CCM): a modern, automated approach that transforms compliance and risk management from a box-ticking exercise, often point-in-time, into a real-time strategic advantage.
May 28, 20253 min read


Navigating the Storm: Effective Communication During a Cyberattack
Whilst effective preventative and detective security controls are essential, a well-defined communication plan is essential
Apr 29, 20242 min read


A guide to strengthening your organisation’s Security Culture
A guide to strengthening your organisation’s Security Culture
Jul 15, 20238 min read


You got the CISO role, now what?
CISO's have a lot on their plate. There are some key areas they need to focus on.
Jun 26, 20232 min read


Business Continuity Planning
Business Continuity Planning is the process of creating plans that outline the steps required to continue operations during disruption
May 15, 20232 min read
bottom of page
