Blog Archive

Understanding MOD Cybersecurity Standards: What You Need to Know

Introduction The Ministry of Defence (MOD) has stringent cybersecurity standards to protect classified information, defence contracts, and national security. Whether [...]

By |2025-03-06T10:57:48+00:00March 3, 2025|Categories: Blogs & News, Glossary|Tags: |0 Comments

Enhancing Vendor Risk Monitoring: Cyber Tzar’s Practical Approach

In an interconnected world, organisations increasingly rely on third-party vendors to support operations, deliver services, and drive innovation. However, this [...]

Vendor Risk Assessments: A Measured Approach to Managing Supply Chain Risks

As supply chains become more interconnected, organisations face mounting risks from third-party vendors. IBM’s 2024 Cost of a Data Breach [...]

Bridging the Cyber Insurance Gap: Challenges & Solutions

Introduction: The Cyber Insurance Dilemma Cyber insurance was once seen as a safety net for businesses, offering financial protection against [...]

Phishing Attacks in Schools: How Cybercriminals Target Staff & Students

Introduction: Schools Are a Prime Target for Phishing Attacks Cybercriminals love targeting schools. Why? Because schools manage sensitive student data, [...]

Overview of the NCSC Guidance on Risk Management 

The National Cyber Security Centre (NCSC) guidance on Risk Management provides a structured and practical framework for understanding, assessing, and [...]

How Cyber Essentials Changes Cyber Insurance for the SME Community

How the “Free” Cyber Insurance with Cyber Essentials Changes the Game for SMEs For SMEs and SMBs, getting cyber insurance [...]

VCs & Cyber Due Diligence: What Investors Now Expect from Startups

Introduction: Cybersecurity is Now a Funding Requirement Venture capital (VC) firms are no longer just evaluating revenue potential, product-market fit, [...]

Why Traditional Vendor Risk Management Fails: Moving Beyond Checklists

Introduction: The Vendor Risk Blind Spot Vendor risk management (VRM) has become a critical concern for enterprises, but many organisations [...]

Supply Chain Risk Mitigation: A Necessary Priority for 2025

In his article "Supply Chain Risk Mitigation Must Be a Priority in 2025" (19 December 2024, Dark Reading), Chief of [...]

API Security for Startups: Protecting Your Platform from Cyber Threats

Introduction: APIs – The Backbone of Modern Startups Startups today rely heavily on APIs (Application Programming Interfaces) to power their [...]

Cyber Insurance Exclusions: What Businesses Need to Know

Introduction: Why Cyber Insurance Isn’t a Silver Bullet Cyber insurance is often seen as a safety net for businesses, protecting [...]

Go to Top