Pitch on the Ship Event
ISSA-UK Annual Summer Conference - Pitch on the Ship The bustling city of London is renowned for its dynamic tech scene, where innovation and collaboration thrive like nowhere else. It's a place where startups and established companies converge, sharing their ideas,...
Staying Cyber Secure During the Summer: Protecting Your Digital World
As summer arrives, many of us are excited about the prospect of holidays, outdoor activities, and relaxation. However, amidst the sun and fun, it's still important to think about cybersecurity. In this blog, we'll explore essential tips and best practices to help you...
Phishing Attacks
What is a phishing attack? A phishing attack is a type of cyber attack that involves sending fraudulent messages to individuals in order to trick them into revealing sensitive information. These messages can take many forms, such as emails, text messages, or social...
Easter Eggs
Easter eggs are hidden messages, features, or jokes that are intentionally placed in software, video games, or other digital media. They are a way for developers to add a bit of fun or personality to their products, and they are often a source of delight for users who...
SELECTING THE RIGHT QSA FOR YOUR BUSINESS
SUMMARY PCI has been around for years, yet I've seen very few papers on how to choose the right QSA for your business. At least not the ones that aren't completely biased. You would think both the card brands and the SSC would want to help you achieve compliance in...
Cyber Plan
HOW TO MANAGE CYBER RISK In the current climate, the need for a clear understanding of the business risks as well as the tools and techniques available to deal with them is fundamental. The velocity of change and the magnitude of the problem is not always fully...
Social Engineering
SOCIAL ENGINEERING Businesses are experiencing an increase in the number of sophisticated and sustained threats carried out by organised criminals in the UK. This also includes the possibility of opportunistic attackers and potentially disgruntled ex-employees who...
Scenario based attack simulation
Whilst conventional assessments remain valuable tools for network security, they often miss those flaws that were previously known or for which no fix is available (it should be noted that these flaws have been proven to be effective against fully patched systems). ...
China Cyber Dilemma in the 21st Century
PEOPLE’S REPUBLIC OF CHINA’S PRACTICE OF NETWORK POWER In today’s world, the information technology revolution is changing with each passing day. In contemporary China, the development of the network business has advanced by leaps and bounds. From mobile payment...
Operational Resilience
In late 2019, early 2020, the world woke up to the first, in modern memory, a truly global pandemic. Prior to COVID-19, Business Continuity Professionals had to go cap in hand with line of business managers to try and perform the annual Business Impact Analysis (BIA),...