Skip to main content

Oops! Looks like we don't have anything matching your search... Take a look at our other insights!

A white robot: Business email compromise scams
6 min read

Can you prove you’re not a robot? BEC scams get AI smarts

It’s important to be aware of how threat actors could use AI to harm your organisation.

Low-angle shot of Eiffel Tower by night: Getting ready for DORA with Spitz Poulle Kannan
8 min read

Getting ready for DORA with Spitz Poulle Kannan

DORA: Finance law specialists Spitz Poulle Kannan discuss how firms can prepare for the Digital Operational Resilience Act.

How strong are your vendors’ ESG frameworks? Polar bear feeling its muscle
1 min read

How strong are your vendors’ ESG frameworks?

Many organisations now support their stakeholders and communities with their environmental, social and governance (ESG) initiatives.

Two yellow butterflies; healthcare with inherent risk questionnaires
5 min read

Improving healthcare with inherent risk questionnaires

Inherent risk questionnaires are an integral part of assessing and managing the risks associated with patient care. 

Adult elephant with baby elephant walking behind
4 min read

Security ratings: The financial sector’s secret weapon

Supplementing your firm’s security with the use of security ratings is the most important thing you can do.

Brown Leopard
7 min read

The field guide to cyber risk quantification and ratings

What is cyber risk quantification, and how do I approach it?

Sydney Opera House
5 min read

A blunder Down Under: ASX’s failed blockchain plans

In 2022, ASX dropped its plans to move to distributed ledger technology. ASX’s adventure in blockchain will now be remembered as a cautionary tale.

Ukraine: Operational resilience
3 min read

Operational resilience: What have U-boats got to do with it?

Geopolitics and cyber risk are inextricably linked. Hybrid warfare, not hybrid working, should be top of network managers’ agendas.

Sitting duck: Let's talk vulnerabilities
6 min read

Let’s talk vulnerabilities

What is a vulnerability? How do you assessment and manage them?

sheep -- typosquatting and typo leaking
6 min read

Spot the difference: A typosquatting primer

Also known as URL hijacking or domain mimicry, typosquatting is a technique that’s almost as old as the internet.