Managing identity permissions and risks in a multicloud environment

For businesses, managing identity permissions and risks in a multicloud environment is a daunting task. The ability to see what permissions are being used, moderate them, and automate processes is critical for achieving a well-secured and managed environment. Microsoft Entra Permissions Management (EPM) and Microsoft Defender for Cloud (MDC) provide comprehensive solutions for dealing with […]

Navigating the complex world of IAM and cloud security

Managing identity permissions and cloud security risks has become a critical challenge as organisations increasingly move their data and applications to the cloud. The growing number of cloud-based applications and services has made it more difficult to ensure that only the appropriate users have access to the appropriate resources, and that access is granted on […]

10 cyber security trends in 2023

Cyber security isn’t easy.  As malicious actors continue to evolve with the times, security protocols and strategies are more critical than ever. The past year has seen a significant number of organisations fall victim to cyber attacks, from Uber and Cisco through to Twilio demonstrating that no business is immune from these insidious threats.  As […]

Building trust in a hyper-connected world

The flood of technological change has led commentators to attach the prefix “hyper-” for special emphasis; the world is hyper-connected, supply chains are hyper-optimised, processes are hyper-specialised, and internet connectivity is hyper-fast.   The reality is that today’s need for speed and efficiency has left businesses increasingly vulnerable and the need for effective cyber security […]

How to Stay One Step Ahead of Ransomware in 2022

In his previous blog, ITC’s Cyber Advisor, Neil Lappage, discussed how the capabilities of ransomware actors and the complexity of attacks are evolving faster than an organisation’s ability to prevent them. Ransomware continues to be amongst the fastest-growing cyber attack strategies faced by businesses today. Bad actors are also making attacks more complex, costly, challenging […]

The Evolving Threat of Ransomware

Ransomware surged during the COVID-19 pandemic to become one of the biggest threats facing businesses. This was echoed by the World Economic Forum’s recent risk survey that reported cyber security as second to climate change as factors that will shape the next decade, with the pandemic coming third place. Although the shift to remote and […]

Mastering Cyber Risk Management

Cyber risk reporting is still in its infancy for many organisations, meaning CISOs lack the necessary tools needed to make business exposure to risk and business value tangible when communicating to the board. The static reports that are the most common output of cyber risk assessments provide limited visibility into where cyber risks are and […]

Not all assets and data are created equal – the critical first step in risk management

Today’s accelerated digital world is exposed to expanding threat vectors however, protecting everything equally is not an option. A crucial question that must be answered at the start of planning any effective cyber security strategy is: ‘What exactly do we value and need to keep secure?’ Rising threat landscape vs organisational preparedness Data breaches big […]

Managing cyber security maturity and business risk within local government

As public councils embark on and continue their digital transformation journey, there is a growing need to counter the risk of a breach by taking the maturity of cyber security practices from a state of reactive, to proactive, and even to predictive. Healthy cyber security is key to the efficient and productive running of every […]

Four cyber security trends to watch

The COVID-19 pandemic has in many ways unleashed a new set of complexities and accelerated existing challenges for organisations globally. In this blog, I explore four cyber security trends leaders should bear in mind when managing cyber risk. Expanding cyber attack surfaces and the new security perimeter As we have all witnessed, the pandemic has […]