ISO 27001 Risk Assessment: 7 Step Guide
Risk assessments remain central to ISO 27001 compliance in 2025, ensuring your…
Building Your Cyber Security Career: The Credentials Needed for Management and Specialist Roles
In a recent webinar hosted by IT Governance, Andy Johnston (divisional director…
when you don’t respond to a crisis — Matt Palmer
A few years ago I wrote a short article about the Titanic,…
What Is the CIA Triad and Why Is It Important?
The CIA triad – confidentiality, integrity and availability – remains the foundational…
Introducing Guernsey Cyber Security Centre — Matt Palmer
Since 2021, I’ve been building Jersey Cyber Security Centre (JCSC). As a…
Penetration Testing for SaaS Providers: Building Trust and Security
In today’s rapidly evolving digital landscape, SaaS (software as a service) providers…
Author of the Month: Bridget Kenyon
ISO 27001 Controls – A guide to implementing and auditing Bridget Kenyon…
Lessons Learned from the Legal Aid Agency Data Breach
The MoJ (Ministry of Justice) has disclosed that the LAA (Legal Aid…
The Co-Op, M&S, Harrods… You? Mitigating the Risk of Ransomware
The recent DragonForce cyber attacks on the Co-Op, Marks & Spencer and…
Author of the Month: Richard Bingley
Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape…