How Do the Cyber Essentials and Cyber Essentials Plus Assessments Work?
Top tips to achieve Cyber Essentials certification from our cyber security assessor…
How to Create a Strong Security Culture
Getting a greater return on investment on your security measures We all…
Layering Defences to Safeguard Sensitive Data Within AI Systems
Strategies for mitigating privacy and security risks As artificial intelligence develops relentlessly,…
Boost Your Security Posture With Objective-Based Penetration Testing
To maximise value from your security investments, your measures must be effective…
Understanding audit and risk — Matt Palmer
Everything we do creates risk. Crossing the street, climbing a mountain, even…
Good auditor or bad auditor – which are you?
Updated from the original published on July 5, 2010 All auditors expect…
An introduction to IT Audit & Information Assurance careers — Matt Palmer
Who should read this?You’re here because you want to learn more about…
What do auditors do all day? — Matt Palmer
If you’ve ever sat at your desk wondering what exactly the bunch…
Should I get CISA Certified? — Matt Palmer
CISA is possibly the one ‘pure’ Information systems audit qualification that is…
Strategies for Securing Your Supply Chain
What to do when your ‘supply chain’ is really a ‘supply loop’…