Skip to content
  • Twitter
  • LinkedIn
  • Instagram
  • Facebook
  • Log in
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us

Wayne Horkan

194 items

  • Blogs & News

    Beyond Compliance: How Enterprise Supply Chains Must Evolve Cyber Risk Strategies

    For many enterprises, supply chain cyber risk management still revolves around checklists and compliance documents — often filed away until [...]

    Continue reading
  • Blogs & News

    Not All Scans Are Equal: Choosing a Platform That Thinks Like Your Business

    Most vulnerability scanners do one thing well: find problems.But very few help you understand what to do next, or how [...]

    Continue reading
  • Blogs & News

    Compliance in Universities: Meeting Cyber Essentials, ISO 27001 & GDPR

    UK universities are under increasing pressure to demonstrate not just academic excellence — but cybersecurity compliance. Whether applying for funding, [...]

    Continue reading
  • Blogs & News

    Cybersecurity for Solicitors: Why Traditional Defences Are No Longer Enough — and How Cyber Tzar Can Help

    The Law Society’s guidance on cybersecurity for solicitors is clear: law firms are an attractive target, and defending against cyber [...]

    Continue reading
  • Blogs & News

    UK Defence Supply Chain: Building a Zero Trust Ecosystem

    The UK defence sector is one of the most targeted environments in cyberspace — and it’s not just the primes [...]

    Continue reading
  • Blogs & News

    The Outsourced Risk Problem: Why Most TPRM Platforms Don’t Actually Scan

    Many third-party risk management (TPRM) platforms promise you supplier insight, cyber risk visibility, and peace of mind. But peel back [...]

    Continue reading
Previous345Next
  • Products
    • Cyber Risk Quantification
    • Cyber Risk Benchmarking
    • Third Party Risk Management
    • InsurTech Risk Analysis
  • Platform
    • Platform
    • Cyber Essentials
    • Partner Program
  • About
    • About
    • Customers
    • Blog Archive
  • Resources
    • Resources
    • Blogs & News
    • Customer Case Studies
    • Partnerships
    • Downloads & Videos
    • Glossary
  • Contact Us
    • Contact Us

+441216617890

contact@cybertzar.com

+441216617890

contact@cybertzar.com

Terms of Service | Cookie Policy | Privacy Policy

Terms of Service | Cookie Policy | Privacy Policy

2025 | Website designed and built by Tweak Marketing

Page load link

We are using cookies to give you the best experience on our website.

Cyber Tzar
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

Go to Top