5 related insights
Use this topic page to move quickly through the most relevant Attomus thinking without losing the wider context across the full insights section.
Browse Attomus insight related to security, with a focus on programme delivery, operational judgement, and professional execution in demanding environments.
Use this topic page to move quickly through the most relevant Attomus thinking without losing the wider context across the full insights section.
A peculiar tension plays out in boardrooms across every sector: cybersecurity represents one of the most critical investments an organisation can make, yet it delivers none of the excitement that typically drives corporate spending decisions. This paradox has become a defining challenge for modern corporate governance, particularly as cyber threats continue to escalate in sophistication and frequency. When a company invests in product development, marketing infrastructure or operational technology, stakeholders can point to tangible outcomes — new features customers will value, expanded market reach, or efficiency gains that boost the bottom line. These investments generate enthusiasm amongst executive teams and shareholders alike because they promise growth, competitive advantage, and visible returns. Cybersecurity, by contrast, promises only that things will continue to function as they currently do. There are no new capabilities to demonstrate, no flashy innovations for the next AGM, no features that will delight customers or differentiate the organisation from its competitors.
Read articleIn the ever-evolving landscape of technology, quantum computing stands out as one of the most revolutionary advancements of the 21st century. While it promises to solve complex problems in fields like medicine, materials science, and artificial intelligence, it also poses a significant threat to the cryptographic systems that underpin modern cybersecurity. In this blog post, we’ll explore how quantum computing could defeat today’s encryption methods and what steps we should take today to safeguard our digital future.
Read articlePostgreSQL, an open-source relational database management system (RDBMS), is widely regarded for its robustness, scalability, and flexibility. However, like any other piece of software, it is not immune to security vulnerabilities. Understanding how a PostgreSQL database could be compromised by a hack is crucial for database administrators and developers to implement effective security measures. This blog post explores the various methods hackers might use to compromise a PostgreSQL database, offering insights into potential vulnerabilities and how to mitigate them.
Read articleLet us start by stating an age-old maxim : You cannot eliminate all risks. But you can reduce the level of risks to an acceptable standard. That’s why building an Information Security and Risk Management (ISRM) programme is essential. Our businesses generate an ever-increasing volume of data. So, in an era where information is currency, and cyber threats continue to evolve, an effective ISRM programme is a necessity. Let’s take a quick look at ISRM and what it takes to put in place an effective programme.
Read articleManaging third-party risk is inevitable when you work with vendors, suppliers, contractors, and business partners. And the harrowing thing is that you have no control over their networks or security. On-off or snapshot assessments of third-party risks still leave your business vulnerable as neither your business nor the third-party’s operates in a static environment. As things change in real time, you need real-time intelligence to manage third-party risk in your firm.
Read article