Skip to NavigationSkip to Content

Blog: read

 Cyber Security Uplift: What Pen Testing 3.0 Looks Like in Practice

Strategy

cyber security uplift

Read

Application Security: From Reactive Remediation to Proactive Protection

Strategy

Chris Lindsey

Security Tools vs. Security Mastery: Why the Difference Matters

Technical

Threat Modelling That Works: The Power of Simple Security

Strategy

Portrait shot of Adam Shostack.

Behind Security Blind Spots: A Lesson in Predictable Human Behaviour

Strategy

A man working on a tablet device.

The Contextual CISO: Matching Leadership to Organisational Need

Strategy

Profile picture of Quentyn Taylor

Data Overload: Causes, Challenges, and Strategies for Actionable Security Insights

Strategy

Portrait of Anthony.

The Art of Risk Management: Conversations, Simplification, and Prioritisation

Strategy

Portrait of Benjamin.

The Future of GRC: Consistency, care, and the human factor

Strategy

Portrait of Gaurav.

Risk as Opportunity: From Avoidance to Strategic Exploitation

Strategy

Portrait of Shana.

Risk Under Pressure: It’s Not About Being Right, It’s About Making Decisions

Strategy

Portrait of Steve.

Jonathan Evans on DORA: Real-World Impact in the EU's Financial Sector

Technical

Jonathan Evans DORA regulation EU

"Moving Left" vs DevSecOps

Technical

Your Cookie Preferences

We use cookies to improve your experience on this website. You may choose which types of cookies to allow and change your preferences at any time. Disabling cookies may impact your experience on this website. By clicking "Accept" you are agreeing to our privacy policy and terms of use.