
Ransomware attacks: How universities can fight back against cyber crime
Two recent cyber attacks on the education sector are disturbing evidence that ransomware gangs are becoming more aggressive and more innovative.

Black Basta, double extortion and RaaS: How ransomware threats are evolving
Ransomware gangs are becoming more aggressive and more innovative than ever before.

What is access control?
Access control is what it sounds like – it means managing, and in some cases restricting, access to computer systems, networks, applications and data.

Cyber risk questionnaires: The areas you can’t overlook
IT Security questionnaires have become a fact of life and a cost of doing business.

Getting to know your attack surface
Your organisation’s attack surface is made up of all the possible entry points that a threat actor can use to get into your systems and data.

Move your TPRM to the next level: Here’s how
Cyberattacks and the accelerating speed of digital capabilities have changed the way organisations approach third-party risk management (TPRM).

Three ways to limit your cyber risk exposure
Cyber security measures are becoming increasingly complex in an effort to combat AI, machine learning and state-sponsored cyber warfare attacks.

How to get the most out of your cyber security solution
The cyber threat environment is changing all the time as criminals adopt increasingly sophisticated measures to counter your defences.

How to fix risk management problems
Third-party risk is everywhere, and it’s growing all the time as a result of greater connectivity.

US NIST Cyber Security Framework under review
The NIST framework has become internationally significant, either adopted as-is or forming the basis for regulatory approaches in other jurisdictions.