Skip to content
  • Twitter
  • LinkedIn
  • Instagram
  • Facebook
  • Log in
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us

Wayne Horkan

167 items

  • Blogs & News

    How Universities Can Secure Research Data Against Cyber Threats

    For UK universities, research is more than a pillar of reputation — it’s a multimillion-pound enterprise. Whether funded by government, [...]

    Continue reading
  • Blogs & News

    Securing E-Commerce: How to Protect Customer Data in Retail

    Retailers are under pressure. Between rising customer expectations, complex supply chains, and an ever-growing web of third-party integrations, securing an [...]

    Continue reading
  • Blogs & News

    Business-Centric Vulnerability Management: Why Prioritisation Beats Volume

    When it comes to vulnerability data, more isn’t better — better is better. ⚠️ Many scanning platforms boast about how [...]

    Continue reading
  • Blogs & News

    Insuring Innovation: How VCs Can Support Smarter Cyber Cover

    Venture capital firms pride themselves on backing bold innovation. But in 2025, one area is still overlooked in too many [...]

    Continue reading
  • Blogs & News

    The Cost of Downtime: Ransomware Impact on Retail Operations

    Ransomware doesn’t just lock up your systems — it freezes your business. For retailers and wholesalers, where margins are tight [...]

    Continue reading
  • Blogs & News

    How ESG is Converging with Cyber in Supply Chain Ratings

    Environmental, Social, and Governance (ESG) reporting is now a core part of enterprise procurement, investment, and regulatory compliance. But in [...]

    Continue reading
Previous123Next
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us

+441216617890

contact@cybertzar.com

+441216617890

contact@cybertzar.com

Terms of Service | Cookie Policy | Privacy Policy

Terms of Service | Cookie Policy | Privacy Policy

2025 | Website designed and built by Tweak Marketing

Page load link

We are using cookies to give you the best experience on our website.

Cyber Tzar
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

Go to Top