When you think about cybersecurity, you generally don’t tend to think about people, and you certainly don’t think about the neurodiversity of people. The profession has been battling a skills gap...
Read more…Not long ago, life seemed comfortable – or at least, I had convinced myself that that was the situation. You see, I thought I was naturally fit. I did not need to exercise or watch what I ate...
Read more…For most organisations, particularly those that are small to mid-size, budget and resources for cybersecurity may not be sufficient to effectively protect their organisation...
Read more…The emergence and rapid growth of online retail is a great example of how businesses can move most of their operations online. Even businesses that don’t sell their products or services online are now benefiting...
Read more…The construction industry is notorious for its reliance on complex supply chains. Entire ecosystems of partners and suppliers collaborate to produce the urban landscapes of tomorrow...
Read more…Since the outbreak of COVID-19, there has been a period of major transition and organisations have had to quickly adapt to weather the storm. Many have managed to remain operational...
Read more…With offices and schools now closed to non-essential workers, most of us are now operating remotely from our homes, often using personally-owned computers and laptops. We’re also relying on online services...
Read more…At CRMG we don’t have an aversion to the array of highly impressive products and services that compete for the modern CISO’s budget. As an example, the role that artificial intelligence (AI) can play in speeding up an organisation’s targeted...
Read more…2019 was an extremely successful year for ransomware, rife with attacks and many high-profile victims. Of all the cyber threats, ransomware was proven to be the most devastating. In the UK, it was reported by the government’s Cyber Security Breach Survey...
Read more…Many organisations are cottoning on to the benefits of a Security Operations Center (SOC) when it comes to achieving effective enterprise-wide systems monitoring, incident detection and response...
Read more…In today’s hyper-connected digital age, it’s not unusual for medium to large-sized companies to have hundreds, or even thousands, of third-party suppliers. This can range from product suppliers, to billing processors, to cloud providers, and a variety of different services...
Read more…We constantly hear “senior management ‘get it’” – but do they really? Senior management's awareness of information security and cyber threats is essential if security teams are to effectively mitigate against them...
Read more…In 2020, increased digital innovation is going to expand the threat landscape drastically, with the acceleration of technologies such as 5G, cloud and Internet of Things (IoT). This will lead to increased data creation, sharing and storage at a pace that is difficult for security teams to keep up with...
Read more…‘Cyber resilience’ seems to be something of a buzz phrase right now, with social media and vendor promotional material often mentioning the importance of resilience. Many conversations about resilience focus on the importance of strong, robust defences, however are robust and strong defences really signs of resilience?...
Read more…