Cybersecurity

How to test Red Canary MITRE ATT&CK Forever Techniques

At the recent MITRE ATT&CK conference, ATT&CKCon in Washington, leading MSSP Red Canary presented an interesting keynote presentation on how they advise organisations should use MITRE ATT&CK in cyber defence. The first takeaway is: Don't boil the ocean. Many organisations waste their time and efforts on vanity statistics, particularly when trying to map their detection

By |2025-10-21T11:30:50+00:00October 21st, 2025|Blog|Comments Off on How to test Red Canary MITRE ATT&CK Forever Techniques

Understanding the NIS2 Directive: A Comprehensive Overview

The NIS2 Directive represents a significant evolution in the European Union's approach to cybersecurity, aiming to bolster the resilience of network and information systems across various critical sectors. This directive not only updates the previous NIS1 framework but also expands its scope, introducing more stringent requirements for member states and organisations alike. In this article,

By |2025-10-02T06:51:55+00:00October 2nd, 2025|Blog|Comments Off on Understanding the NIS2 Directive: A Comprehensive Overview

What to expect from a BAS tool

The Breach and Attack Simulation (BAS) market is still relatively new for many companies and like all new ideas and concepts, it can take some time to fully understand how to embrace, so here are five key things that you should expect from a BAS tool. Validate security control effectiveness • test endpoint • lateral

By |2025-08-11T07:18:14+00:00August 8th, 2025|Blog|Comments Off on What to expect from a BAS tool

How to Demonstrate Continuous Compliance for DORA & NIS2

Demonstrating Continuous Compliance for pivotal regulations like the EU's Digital Operational Resilience Act (DORA) and the revised Network and Information Security Directive (NIS2) demands a profound evolution beyond traditional approaches. It necessitates a fundamental shift in mindset, moving decisively away from a static, audit-driven, and often reactive posture. The old paradigm, where cybersecurity compliance might

By |2025-10-22T08:09:09+00:00June 25th, 2025|Blog|Comments Off on How to Demonstrate Continuous Compliance for DORA & NIS2

Continuous Compliance & Adversarial Exposure Validation

The journey towards genuine, Continuous Compliance is far more than an exercise in drafting policies and implementing security controls. It demands a profound, persistent, and practical understanding of one crucial question: are our defences truly effective against sophisticated, ever-evolving adversaries? This is where the discipline of Adversarial Exposure Validation (AEV) – often termed Security Controls

By |2025-11-04T08:16:56+00:00June 18th, 2025|Blog|Comments Off on Continuous Compliance & Adversarial Exposure Validation

10 Proactive Measures To Navigate the EU’s NIS2 Directive

Navigating the EU's NIS2 Directive demands more than just ticking the initial boxes defined by local legislation. True adherence to this regulatory framework isn't a one-time achievement; it necessitates continuous engagement, clearly assigned responsibilities and the consistent refinement of policies and security measures. Failure to maintain this state of compliance carries the same significant risks

By |2025-04-25T11:33:57+00:00April 25th, 2025|Blog|Comments Off on 10 Proactive Measures To Navigate the EU’s NIS2 Directive

Top 5 Strategic Information Security Priorities for 2025

The threat landscape is constantly evolving, and organisations must stay ahead of the curve to protect their valuable assets. In 2025, cybersecurity leaders should prioritise the following strategic initiatives: 1. Vulnerability Management Vulnerabilities are the chinks in your armor, the weaknesses that attackers exploit to gain access to your systems. Effective vulnerability management is crucial

By |2024-12-18T09:26:09+00:00December 18th, 2024|Blog|Comments Off on Top 5 Strategic Information Security Priorities for 2025

Enhancing Cybersecurity with Threat Informed Defence

In today's hyper-connected world, where data breaches and cyberattacks are rampant, the importance of robust cybersecurity cannot be overstated. Threat Informed Defence is a dynamic and proactive approach gaining traction among organisations aiming to fortify their digital defences. Enhancing cybersecurity with Threat Informed Defence has never been easier. This article delves into the core elements

By |2024-11-21T07:55:23+00:00November 21st, 2024|Blog|Comments Off on Enhancing Cybersecurity with Threat Informed Defence
Go to Top