![Five minutes with the PE cyber experts](/sites/default/files/styles/all_news_listing/public/2024-07/shutterstock_1092244967.webp?itok=qDb2Hp3d)
Five minutes with the PE cyber experts
Ed Starkie and Ben Hawkins gave us five minutes of their time to run through the current state of cyber security for private equity.
![Understanding supply chain and concentration risks in cloud services](/sites/default/files/styles/all_news_listing/public/2024-07/shutterstock_1319520962.webp?itok=3UkNedP0)
Understanding supply chain and concentration risks in cloud services
The major incident on Friday, 19 July highlighted the high levels of concentration risk emerging from our technology landscape.
![Where to start with cybersecurity for private equity](/sites/default/files/styles/all_news_listing/public/2024-06/shutterstock_2250923081.webp?itok=b2OvZ1mi)
Where to start with cybersecurity for private equity
Cybersecurity for private equity (PE) firms is a central concern given the sensitive nature of the data they handle.
![Webinar: Cyber Risk Management for Private Equity Firms](/sites/default/files/styles/all_news_listing/public/2024-07/New%20PE%20Webinar%20Thumbnail%20%281%29.webp?itok=XdRwJxV5)
Cyber Risk Management for Private Equity Firms
Don’t miss this opportunity to enhance your understanding of the cyber security threat landscape.
![Why cryptocurrencies are fuelling ransomware](/sites/default/files/styles/all_news_listing/public/2024-05/shutterstock_269465429.webp?itok=tO9cwatr)
Why cryptocurrencies are fuelling ransomware
There is no single reason behind why cryptocurrency plays such a crucial role in the rise of ransomware attacks.
![The crucial role of incident response in safeguarding against cyber attacks](/sites/default/files/styles/all_news_listing/public/2024-05/shutterstock_1287768601.webp?itok=2fQKGZ-4)
The crucial role of incident response in safeguarding against cyber attacks
Incident response is a systematic approach to managing and mitigating the aftermath of a cyber attack.
![Incident response plans: Understanding the essential teams and tools](/sites/default/files/styles/all_news_listing/public/2024-05/shutterstock_2316993271%20%281%29.webp?itok=wPGcYWyG)
Incident response plans: Understanding the essential teams and tools
Incident response plans (IRPs) are a vital component of effective management and mitigation of cybersecurity incidents.
![No safe havens in an online world: Jersey’s proposed new cybersecurity law enters final stages](/sites/default/files/styles/all_news_listing/public/2024-05/shutterstock_576495037.webp?itok=evwENb13)
No safe havens in an online world: Jersey’s proposed new cybersecurity law enters final stages
Jersey is embracing numerous new technologies and systems, creating opportunities for the island’s economy and society.
![Kuwait Clearing Company and Thomas Murray sign MoU to enhance cybersecurity cooperation](/sites/default/files/styles/all_news_listing/public/2024-04/shutterstock_1144899230.png?itok=Ee1hqq3G)
Kuwait Clearing Company and Thomas Murray sign MoU to enhance cybersecurity cooperation
The Kuwait Clearing Company (Maqasa) and Thomas Murray today signed a Memorandum of Understanding (MoU) to deepen collaboration around cybersecurity
![A day in the life of… a cyber threat intelligence lead](/sites/default/files/styles/all_news_listing/public/2024-04/shutterstock_267745076.webp?itok=skHG1mrg)
A day in the life of… a cyber threat intelligence lead
Stephen Green, Cyber Threat Intelligence Lead, shares a page from his diary.