Security

Blog / Security

The Cybersecurity Paradox: Investing in What Organisations Hope to Never Need

featured cybersecurity risk-management ciso security   

A peculiar tension plays out in boardrooms across every sector: cybersecurity represents one of the most critical investments an organisation can make, yet it delivers none of the excitement that typically drives corporate spending decisions. This paradox has become a defining challenge for modern corporate governance, particularly as cyber threats continue to escalate in sophistication and frequency.

When a company invests in product development, marketing infrastructure or operational technology, stakeholders can point to tangible outcomes — new features customers will value, expanded market reach, or efficiency gains that boost the bottom line. These investments generate enthusiasm amongst executive teams and shareholders alike because they promise growth, competitive advantage, and visible returns. Cybersecurity, by contrast, promises only that things will continue to function as they currently do. There are no new capabilities to demonstrate, no flashy innovations for the next AGM, no features that will delight customers or differentiate the organisation from its competitors.

Read More…

How Quantum Computing Could Defeat Today's Encryption and What We Should Do to Protect Ourselves

featured quantum counter-measures data-security security   

In the ever-evolving landscape of technology, quantum computing stands out as one of the most revolutionary advancements of the 21st century. While it promises to solve complex problems in fields like medicine, materials science, and artificial intelligence, it also poses a significant threat to the cryptographic systems that underpin modern cybersecurity. In this blog post, we’ll explore how quantum computing could defeat today’s encryption methods and what steps we should take today to safeguard our digital future.

Read More…

How a PostgreSQL database could be compromised by an attacker

postgresql security   

PostgreSQL, an open-source relational database management system (RDBMS), is widely regarded for its robustness, scalability, and flexibility. However, like any other piece of software, it is not immune to security vulnerabilities. Understanding how a PostgreSQL database could be compromised by a hack is crucial for database administrators and developers to implement effective security measures. This blog post explores the various methods hackers might use to compromise a PostgreSQL database, offering insights into potential vulnerabilities and how to mitigate them.

Read More…

Effective Information Security & Risk Management ISRM Programmes

CISO security   

Let us start by stating an age-old maxim : You cannot eliminate all risks. But you can reduce the level of risks to an acceptable standard. That’s why building an Information Security and Risk Management (ISRM) programme is essential.

Our businesses generate an ever-increasing volume of data. So, in an era where information is currency, and cyber threats continue to evolve, an effective ISRM programme is a necessity.

Let’s take a quick look at ISRM and what it takes to put in place an effective programme.

Read More…

Managing Third-Party Risk - the Importance of Real-Time Intelligence

ciso security   

Managing third-party risk is inevitable when you work with vendors, suppliers, contractors, and business partners. And the harrowing thing is that you have no control over their networks or security.

On-off or snapshot assessments of third-party risks still leave your business vulnerable as neither your business nor the third-party’s operates in a static environment. As things change in real time, you need real-time intelligence to manage third-party risk in your firm.

Read More…