Getting ready for Microsoft Security Copilot

As we have seen over the last six to 12 months, Microsoft has been releasing Copilot solutions for various workloads (Microsoft Copilot for M365, Copilot for Power Platform, etc). At Microsoft Secure in March 2023, Microsoft Security Copilot, also known as Security Copilot, was announced, and recently more information has surfaced regarding its features, benefits […]

Critical F5 BIG-IP bug​

Multiple vulnerabilities have been found in the F5’s BIG-IP network software  (BIG-IP iControl REST) authentication. Disclosed last week, the bug affects multiple versions of the network management software, which is being tracked as CVE-2022-1388.​ ​Patch ASAP! ​ ​Although CVE-2022-1388 is a proof-of-concept (PoC), there is still a high chance that this vulnerability could expose thousands of users to a remote […]

In partnership with Condatis: Outlook for Identity and Access Management

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

Panel: Resilience to Risk

ITC’s 8th annual Cyber Summit 2022 centres around the theme BEYOND – From resilience to risk. 2021 was the year where resilience was a must for organisations to survive, and whilst this will continue, 2022 is the year where organisations will need to go beyond surviving to thriving – by innovating and strengthening their approach to […]

The Importance of Fostering A Culture of Cyber Security

With many organisations around the world shifting gear to a hybrid working model and accelerating cloud adoption at speed, we continue to witness a surge of sophisticated cyber attacks backed by increased adversary motivation and capability. Therefore, it is not a surprise that cyber security has been identified as the top priority for businesses post-pandemic, […]

The Human Element of Cyber Risk

If I were to ask 10 people what they thought cyber security actually entails, I am almost certain that most would think of the highly technical coding you see in movies. Although they would not be entirely wrong, there is so much more to cyber security than just technology. Yes, there are many solutions available […]

Mastering Cyber Risk Management

Cyber risk reporting is still in its infancy for many organisations, meaning CISOs lack the necessary tools needed to make business exposure to risk and business value tangible when communicating to the board. The static reports that are the most common output of cyber risk assessments provide limited visibility into where cyber risks are and […]

Not all assets and data are created equal – the critical first step in risk management

Today’s accelerated digital world is exposed to expanding threat vectors however, protecting everything equally is not an option. A crucial question that must be answered at the start of planning any effective cyber security strategy is: ‘What exactly do we value and need to keep secure?’ Rising threat landscape vs organisational preparedness Data breaches big […]