How DORA fits with ISO 27001, NIS2 and the GDPR
Although DORA (the EU Digital Operational Resilience Act) has been in effect…
CISM Exam Tips from a Consultant: Five Insider Insights to Help You Pass
The CISM® (Certified Information Security Manager) exam is one of the toughest…
What DORA Means for ICT Suppliers: MSPs, SaaS and Cloud in Scope
If you provide ICT (information and communication technology) services to financial institutions in…
Cyber Security Must Be a Board Priority – And It Starts With Cyber Essentials
Senior ministers and national security officials have called on boards to take…
Global Encryption Day: Why Encryption Is a Core Requirement
Today, 21 October, is Global Encryption Day. Led by the Global Encryption…
Top 5 Skills Every ISO 27001 Internal Auditor Needs
Internal audits are essential to ISO 27001 compliance, as mandated by Clause…
AWS Outage: A Supply-Chain Security Lesson
It sometimes seems that each new supply-chain security breach we see in…
ISO 27001:2022 Clause 6 – What’s Changed and What You Need to Do about It
All ISO 27001:2013 certificates expire at the end of this month. For…
4 reasons to get CISMP qualified
Awarded by BCS, The Chartered Institute for IT, the CISMP (Certificate in…
CISM vs CISSP: Which Certification is Right for You in 2025
Choosing between CISM® (Certified Information Security Manager) and CISSP® (Certified Information Systems…



















