Blog

Automated Cyber Resilience Testing – Why It Matters

Cyber security has become a boardroom priority as the scale and sophistication of cyber-attacks continue to escalate. Ransomware, in particular, has emerged as one of the most devastating threats, inflicting significant financial and reputational damage to organisations worldwide. Keeping Company Boards informed on their organisation's cyber resilience posture against these ever-evolving attacks isn't just good

By |2024-05-16T14:38:05+00:00May 16th, 2024|Blog|Comments Off on Automated Cyber Resilience Testing – Why It Matters

Automated Cyber Resilience Testing and NIS2 Compliance

The European Union's Directive on Security of Network and Information Systems (NIS Directive) was adopted in 2016. It aimed to achieve a high common level of cyber security across EU member states. The recently approved NIS2 Directive (Directive (EU) 2021/2034), which began enforcement in January 2024, builds on the foundation laid by its predecessor. It

By |2024-05-09T11:38:04+00:00May 9th, 2024|Blog|Comments Off on Automated Cyber Resilience Testing and NIS2 Compliance

Automated Cyber Resilience Testing: The Key to DORA Compliance and Beyond

The European Union's Digital Operational Resilience Act, or DORA, is a sweeping piece of legislation reshaping how financial entities in the EU handle cyber security and operational resilience. DORA compliance isn't just a regulatory requirement—it's imperative to safeguard critical financial systems. It also maintains customer trust in the face of relentless cyber threats. This article

By |2024-05-15T14:30:19+00:00May 2nd, 2024|Blog|Comments Off on Automated Cyber Resilience Testing: The Key to DORA Compliance and Beyond

Ransomware Attacks: Break the Cycle – Protect Yourself & Avoid Repeat Strikes

Ransomware is one of the most devastating cyber threats facing businesses today. The financial and reputational damage can be catastrophic, but even more alarming is the trend of repeat attacks. A staggering 78% of companies who pay the ransom get hit a second time, often by the same attackers (Infosecurity Magazine). This raises a crucial

By |2024-02-29T10:24:08+00:00February 29th, 2024|Blog|Comments Off on Ransomware Attacks: Break the Cycle – Protect Yourself & Avoid Repeat Strikes

How To Test Cyber Threats Using MITRE ATT&CK

Introduction Cyber attacks are not only increasing in frequency but also in sophistication. Adversaries leverage advanced tactics and techniques that constantly evolve. In this arms race, the MITRE ATT&CK framework has emerged as a vital tool for cybersecurity professionals, providing a structured knowledge base of real-world adversary behaviors. This article will explore why testing cyber

By |2024-02-17T11:17:14+00:00February 17th, 2024|Blog|Comments Off on How To Test Cyber Threats Using MITRE ATT&CK

How to Assess Your Cyber Risk Posture

A cybersecurity posture encompasses an organisation's overall resilience against cyber-attacks, its preventive protocols, and its capacity to react to emerging threats. Given the increasing numbers and sophistication of cyber threats and hackers, having a well-defined understanding of your organisation's cybersecurity posture is now more crucial than ever. The pressure from both strict compliance standards and

By |2023-11-14T15:13:13+00:00November 14th, 2023|Blog|Comments Off on How to Assess Your Cyber Risk Posture

A Guide to Security Controls Validation

On a daily basis, security teams are confronted with the challenging responsibility of detecting and overseeing security vulnerabilities within their expanding attack surface. Ongoing digital transformation projects, the migration to cloud infrastructure, corporate mergers and acquisitions, and various other IT environment alterations consistently introduce the business to fresh risks. Enter Security Controls Validation - an

By |2023-11-08T16:21:17+00:00November 8th, 2023|Blog|Comments Off on A Guide to Security Controls Validation

Enhancing Cybersecurity with Threat-Informed Defense

In today's digital landscape, organizations face an ever-increasing number of cyber threats that can cause significant damage and disruption. To effectively protect their networks, systems, and data, organizations need a proactive approach that goes beyond traditional security measures. This is where threat-informed defense comes into play. Threat-informed defense is a strategic approach to cybersecurity that

By |2023-10-27T10:28:24+00:00October 27th, 2023|Blog|Comments Off on Enhancing Cybersecurity with Threat-Informed Defense

Understanding the Telecommunications (Security) Act

In our increasingly interconnected world, the security of telecommunications infrastructure has never been more critical. As technology advances, so do the threats and vulnerabilities that can compromise the integrity and privacy of communications networks. The continuous evolution of technology has led to a greater dependence on telecommunications systems for various aspects of our daily lives.

By |2023-10-18T12:42:06+00:00October 18th, 2023|Blog|Comments Off on Understanding the Telecommunications (Security) Act

NSA and CISA Red Share Top Ten Cybersecurity Misconfigurations

National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity advisory (CSA), NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations, which provides the most common cybersecurity misconfigurations in large organizations, and details the tactics, techniques, and procedures (TTPs) actors use to exploit these misconfigurations. The Top 10

By |2023-10-05T20:42:42+00:00October 5th, 2023|Blog|Comments Off on NSA and CISA Red Share Top Ten Cybersecurity Misconfigurations
Go to Top