Blog
- Home
- Blog
NIST Offers 19 Ways to Build Zero Trust Architectures
June 11, 2025
No Comments
The examples use off-the-shelf commercial technologies, giving organizations valuable starting points.
Products on your perimeter considered harmful (until proven otherwise)
June 11, 2025
No Comments
As attackers’ tactics change, so must network defenders’.
8 Surefire Ways to Improve Your Risk Management Program
June 9, 2025
No Comments
Operational disruptions, system downtime, fraud, fines for noncompliance, market changes, and technology shifts are just a few of the risks organizations are battling today. Any
Navigating Regulatory Challenges in Third-Party Risk Management: What You Need to Know
June 9, 2025
No Comments
Sausages and incentives: rewarding a resilient technology future
June 6, 2025
No Comments
Why ‘thinking big’ is required to shift the dynamics of the technology market.
UK and allies expose Russian intelligence campaign targeting western logistics and technology organisations
May 21, 2025
No Comments
Organisations urged to familiarise themselves with the threat and take immediate action to protect themselves.
Latest imported feed items on
- AWS re:Inforce roundup 2025: top announcementsAt AWS re:Inforce 2025 (June 16-18, Philadelphia), AWS Vice President and Chief Information Security Officer Amy Herzog delivered the keynote address, announcing new security innovations. Throughout the event, AWS announced additional security capabilities focused on simplifying security at scale and enabling organizations to build more resilient applications in the cloud. Below is a comprehensive roundup […]
- Digital infra/STRUCTURE Weekly Update: Colo Sector Rebounds as AI Anchors, JV Megaprojects Redefine Infrastructure ScaleOriginally posted on Infra/STRUCTURE Summit. The data centre colocation sector is experiencing growth, with ecosystem companies like NVIDIA, AMD, and energy firms providing optimistic data points during earnings season. Applied Digital secured a multi-year lease with CoreWeave for 250MW capacity in North Dakota, marking significant progress in GPU cloud expansion. CoreWeave is involved in large-scale […]
- Active Cyber Defence: Sixth annual report now availableNew ACD services developed to help protect SMEs from the harms caused by cyber attacks.
- Authentication methods: choosing the right typeRecommended authentication models for organisations looking to move 'beyond passwords'.
- Advancing Data Center Construction 2025
- Register for the 2025 rimap® Advanced Workshop!Join us for an engaging and transformative workshop experience. rimap® Advanced Workshop 2025: ERM, Sustainability, Innovation and the Circular Supply Chain. Innovating for Impact: Risk Management in the Age of Reuse and Regulation In today’s rapidly shifting regulatory and environmental landscape, the integration of sustainability into the supply chain has become essential for long-term resilience […]
- NIST Offers 19 Ways to Build Zero Trust ArchitecturesThe examples use off-the-shelf commercial technologies, giving organizations valuable starting points.
- Products on your perimeter considered harmful (until proven otherwise)As attackers' tactics change, so must network defenders'.
- 8 Surefire Ways to Improve Your Risk Management ProgramOperational disruptions, system downtime, fraud, fines for noncompliance, market changes, and technology shifts are just a few of the risks organizations are battling today. Any organization still managing risk with old-school silos and walled-off data is at a huge disadvantage compared with more forward-thinking competitors. You need a comprehensive, proactive approach to risk management [...] […]
- Navigating Regulatory Challenges in Third-Party Risk Management: What You Need to Know