September 1, 2018
detective controls in AWS

AWS Cloud: Proactive Security and Forensic Readiness – part 4

Part 4: Detective Controls in AWS Security controls can be either technical or administrative. A layered security approach to protecting an organisation’s information assets and infrastructure […]
August 23, 2018
A person looking at a screen showing static, signifying security news

Security newsround: August 2018

We round up research and reporting from across the web about security developments. This month in our security newsround: authentication acceptance, failing the text test, defining […]
August 16, 2018
Trees bending in the wind signifying resilience

Here’s the missing ingredient in a solid security and business continuity plan

Security incidents can cast an unforgiving light on many organisations’ readiness. They highlight the need for security programmes that go further than just fixing things when […]
July 24, 2018

I read the news today, oh boy: social sharing and the dangers of false information

We’ve all done it: shared a post on social media in the belief that it’s spreading an important message or helping someone in need. But how […]
July 10, 2018
A person looking at a screen showing static, signifying security news

Security newsround: July 2018

We round up reporting and research from across the web about the latest security news and developments. This month: stress test for infosec leaders, cybercrime by […]
June 29, 2018
Child's toys lego bricks

Security awareness: it’s all just child’s play

Security awareness is not so different from parenting. Our aim is to change behaviour for the better. As dad to three children, I’m used to communicating […]
May 23, 2018

The answer’s in the question: risk assurance that’s ready-made for a regulator

Regulators and auditors expect us to have all kinds of controls in place to manage information security. Standards like ISO 27001 or frameworks like the CIS […]
May 17, 2018

Charities guide to better cybersecurity in 10 steps

Charities in Ireland face an increase in cybersecurity threats. Cybercrime incidents are increasing, and no-one is immune. Criminals have the means and the opportunity to target […]