risk management

Data classification: What, why and who provides it

When it comes to managing data, we need to know where it is – but we also need to know what it is. With the rise in regulatory controls, enterprises now pay more attention to data sovereignty, especially when it comes to data in the cloud, but to know exactly what information they hold is…

Data classification: What, why and who provides it Read More »

How UK firms can get ready for the implementation of NIS2

The European Union’s landmark cyber security bill NIS2 is just months away from coming into force. With a compliance deadline of 17 October, the law aims to improve the bloc’s ability to fight rising levels of cyber crime by ensuring all member states follow the same cyber security rules and procedures.  Under this directive, each EU member…

How UK firms can get ready for the implementation of NIS2 Read More »

Forrester: Rethink your software asset management practices

Software asset management (SAM) has evolved from simple back-office record-keeping to more complex licence and contract management that integrates innovative technologies such as artificial intelligence (AI), machine learning (ML) and generative AI (GenAI). Successful SAM implementations save on licence costs, improve compliance and reduce true-ups. They also improve software utilisation, enabling firms to derive more…

Forrester: Rethink your software asset management practices Read More »

Cloud security challenges not just technological

In the evolving IT landscape, cloud deployments have become deeply entrenched in business operations, presenting both unprecedented opportunities and significant challenges. The widespread adoption of cloud technologies has created a complex and dynamic environment, often spanning multiple providers and geographical regions, each with its own laws, regulations, and standards. From fragmented environments to access control…

Cloud security challenges not just technological Read More »

Mimecast to buy insider threat specialist Code42

Human-centred risk management experts Mimecast and Code42 are to come together as a single business in an acquisition that builds on a previously established tech partnership, with Mimecast set to add Code42’s product suite into its platform to enhance its insider threat detection and response capabilities. Mimecast, which bills itself as a provider of “AI-powered,…

Mimecast to buy insider threat specialist Code42 Read More »

Security Think Tank: Securing today’s ubiquitous cloud environment

Today’s digital, on-demand age sees many organisations rely heavily on multiple cloud services for the day-to-day running of their operations. But the third-party nature of this functionality introduces additional security risks and, with bad actors ever-present to take advantage of porous network perimeters, cyber security professionals must ensure they are rigorous in safeguarding the enterprise.…

Security Think Tank: Securing today’s ubiquitous cloud environment Read More »

Gartner: Navigating incident response in the cloud

Traditional incident response (IR) processes, honed for on-premises environments, face significant challenges when applied to the cloud. The shared responsibility model of cloud environments demands a reassessment and upgrading of IR procedures. To navigate these challenges effectively, security and risk management (SRM) leaders must embrace new strategies and technologies tailored to the unique nature of…

Gartner: Navigating incident response in the cloud Read More »

Q&A: Adalbjorn Thorolfsson on IT project management in Iceland

The Icelandic Project Management Association was founded in 1984 by engineers and, as such, was initially focused on engineering projects. As project management evolved and became used in more sectors, such as information technology, healthcare, finance and the public sector, the composition of the members of the association and the board changed accordingly. Adalbjorn Thorolfsson…

Q&A: Adalbjorn Thorolfsson on IT project management in Iceland Read More »

Best practices to beat container misconfiguration

He urges IT decision-makers to strategise better and only shift what is optimum for the new environment – transforming assets to reduce complexity, probability of human error, and cost. According to Firment, container misconfiguration is a symptom of larger problems with migrations that haven’t incorporated architecture and practice modernisation. Good strategy means less is missed…

Best practices to beat container misconfiguration Read More »

97 FTSE 100 firms exposed to supply chain breaches

Of the 100 organisations listed on the Financial Times Stock Exchange (FTSE) 100 list of Britain’s most highly capitalised firms, 97 were exposed to a third-party supply chain data breach incident between March 2023 and March 2024, according to data published by SecurityScorecard ahead of the annual Infosec Europe fair. The findings, which come as…

97 FTSE 100 firms exposed to supply chain breaches Read More »

Shopping Cart
Scroll to Top