Skip to main content

Oops! Looks like we don't have anything matching your search... Take a look at our other insights!

Pair of wandering albatrosses flying above grassy hill, with snowy mountains and light blue ocean in the background, South Georgia Island, Antarctica. Understanding inherent risk and residual risk.
3 min read

Understanding inherent risk and residual risk

Knowing the difference between inherent risk and residual risk is key to good risk management processes.

Exploring the world of cyber investigations: Close-up of a man in a suit looking at a tablet device
4 min read

Exploring the world of cyber investigations

As our reliance on digital devices continues to grow, so does the importance of digital forensics in analysing, and presenting electronic evidence.

A digital forensics investigation in nine parts: Close-up of a thumb overlaid with microchip imagery
5 min read

A digital forensics investigation in nine parts

This brief introductory guide breaks down a typically complex digital forensics investigation into nine distinct stages.

The Bandra-Worli Sea Link, also called Rajiv Gandhi Sea Link at dusk. It is a cable-stayed vehicular bridge that links Bandra in the northern suburb of Mumbai with Worli in South Mumbai. T+1 settlement cycles
6 min read

T+1 settlement cycles: Lessons from India and the Asia-Pacific

When the US equities market transitioned to T+1 in late May 2024, India had already been operating a T+1 settlement cycle for almost 18 months.

Cyber threats to the Scandinavian financial sector

Cyber threats to the Scandinavian financial sector

State-aligned threat actors hunting for lucrative targets favour Scandinavia for both financial and political reasons.

Thailand The rise of eCommerce and eCrime

Thailand: The rise of eCommerce and eCrime

A rush to digitalisation provides a target-rich environment for adversarial cyber actors.

Critical vulnerabilities in ConnectWise ScreenConnect: CVE-2024-1708 and CVE-2024-1709. Close-up of a laptop overlayed with a graphic of a digital network
6 min read

Critical vulnerabilities in ConnectWise ScreenConnect  

The recent ScreenConnect vulnerabilities pose a serious threat to organisations.

Calculating the cost of cyber attacks: An economic analysis of the worldwide impact

Calculating the cost of cyber attacks

We know that increasing levels of digitisation in an economy are accompanied by a rise in cyber attacks, but how can that damage be quantified?

NIST Cybersecurity Framework: Frequently asked questions
5 min read

NIST Cybersecurity Framework: Frequently asked questions

The NIST Cybersecurity Framework is a set of guidelines and standards designed to help organisations manage and improve their cyber security posture.

Third-Party Cyber Risk eBook

Managing third-party cyber risk in the supply chain

Third parties are often a vital part of delivering mission-critical products and services on behalf of client organisations.