Trusted Advisor Understanding UK FCA and PRA Operational Resilience This short article is designed to provide you with a high-level overview of the UK financial regulators requirements relating to operational resilience.
Cybersecurity Cybersecurity critical controls A short article covering Cybersecurity Critical Controls - ideal for small and medium sized companies looking to improve their cyber security posture.
Trusted Advisor EU DORA ICT Third-party providers A short blog summarising how DORA is applied to ICT Third-party providers.
Trusted Advisor ICT third party management In this article we will be touching on the key components the European Supervisory Authorities are expecting for you to manage your ICT third-party service providers competently.
Trusted Advisor Critical ICT Third-Party Providers (CTPP) A short read on how the European Supervisory Authorities identify critical ICT third-party providers (CTPP).
Trusted Advisor EU Threat Led Penetration Testing (TLPT) A short article designed for board level consumption explaining Threat Led Penetration Testing both in terms of key teams and the overall process.
Trusted Advisor CrowdStrike and Digital Operational Resilience In this blog we outline two steps to mitigate the next CrowdStrike like incident. Take control of your ICT Risk. It’s your risk and you can’t outsource it!
Trusted Advisor Free digital operational resilience webinars A series of free digital operational resilience webinars being conducted in July 2024 by IT Security Locksmith
Cybersecurity Certificate transparency and how cybersecurity teams can use it? Certificate Transparency (CT) and how knowing about newly registered digital certificates can put your cybersecurity team into proactive mode.
Trusted Advisor Strengthening Cyber Resilience A talk with Chaleit on Cyber Resilience and compliance with the EU's Digital Operational Resilience Act.
Cryptanalysis Crypto wallet recovery 2.0 Four pitfalls of crypto wallets to protect against: loss, deletion and theft!
Trusted Advisor Understanding the critical role of the board in cybersecurity and digital operational resilience Understanding board level cyber strategy and digital operational resilience through executive cyber risk management.
Trusted Advisor How to keep windows 11 running smoothly Six simple steps to keep your Windows 11 system working efficiently and securely.
Trusted Advisor Banned and High-risk AI Use The new EU Artificial Intelligence (AI) Act prohibits the use of AI for specific purposes and requires high-risk uses to pass the EU declaration of conformity (CE).
Trusted Advisor How to meet the EU Digital Operational Resilience Act (Dora) EU regulators can summons financial services boards, temporary or permanently shut down a financial entity's operations or publicise any breach.
Cybersecurity €15Million fines and the EU Cyber Resilience Act (CRA) This act is ground breaking. It’s going to place the EU at the heart of driving hardware and software cybersecurity assurance world-wide.
Trusted Advisor First Board Level Cybersecurity course successfully delivered! What a great feeling, our first Board Level Cybersecurity course successfully delivered! Our favourite feedback: "The course was excellent awesome content"
Trusted Advisor Board level cybersecurity warning signs End of life systems should be a major concern for any board. What are you doing to manage the ICT risks associated?
Cryptanalysis NIST Elliptic Curve $12k bounty Putting some fun back into Cryptanalysis with a $12k bounty!
Trusted Advisor Board Level Cybersecurity course A short five hour expert-led course on Cybersecurity for senior executives delivered by Jonathan Evans.
Cybersecurity LinkedIn Smart Links being used to Phish Well worth 3 minutes of your day to read and adding to your security awareness training.
Cybersecurity NSA and CISA Top 10 Cybersecurity Misconfigurations The NSA and CISA have released a Joint Cybersecurity Advisory covering common misconfigurations.
Cryptanalysis Crypto Wallet Password Recovery Useful tips on how to go about recovering a crypto wallet password containing crypto-currency such as Bitcoin or Ethereum in as safe a manner as possible.
Cybersecurity How to fix security vulnerabilities Fix security vulnerabilities through automation, simplification and improved reporting.