Strategies for Securing Your Supply Chain
What to do when your ‘supply chain’ is really a ‘supply loop’…
Is CISM certification right for IT Auditors? — Matt Palmer
The Certified Information Systems Manager (CISM) qualification is provided by ISACA, and…
How to Meet the NCSC’s 14 Cloud Security Principles
Guidance for conducting your due diligence when outsourcing to a Cloud service…
Should I get CISSP Certified? — Matt Palmer
The focus of CISSP is purely Information Security. Having said that, its…
A personal experience of CISSP boot camp — Matt Palmer
Information risk and security is an infinite field of work and study.…
Project assurance skills and Prince 2 for IT auditors — Matt Palmer
The challenge of IT Project AssuranceProject assurance can be a challenge; change…
The Insider Threat: Strategies to Safeguard Against Malicious Insiders
Your biggest security threat may be hiding in plain sight: your employees.…
Lessons from the MGM cyber attack — Matt Palmer
On September 12, 2023, MGM Resorts International experienced a cyber attack that…
Online Merchants: PCI DSS Compliance Tips When Outsourcing
Common challenges for SAQ A/e-commerce merchants and how to resolve them E-commerce…
How to get fast board buy-in for your cyber security project — Matt Palmer
To experts, the business case for cyber security change programmes can seem…