Blog Archive

How to Evaluate Third-Party Cyber Risk: A Step-by-Step Guide

Introduction Organisations are increasingly dependent on third-party suppliers, cloud providers, and service partners to operate efficiently. However, these relationships introduce [...]

By |2025-06-17T23:00:34+00:00April 2, 2025|Categories: Blogs & News, Glossary|Tags: , |0 Comments

Understanding MOD Cybersecurity Standards: What You Need to Know

Introduction The Ministry of Defence (MOD) has stringent cybersecurity standards to protect classified information, defence contracts, and national security. Whether [...]

By |2025-03-06T10:57:48+00:00March 3, 2025|Categories: Blogs & News, Glossary|Tags: |0 Comments

Enhancing Vendor Risk Monitoring: Cyber Tzar’s Practical Approach

In an interconnected world, organisations increasingly rely on third-party vendors to support operations, deliver services, and drive innovation. However, this [...]

Vendor Risk Assessments: A Measured Approach to Managing Supply Chain Risks

As supply chains become more interconnected, organisations face mounting risks from third-party vendors. IBM’s 2024 Cost of a Data Breach [...]

Bridging the Cyber Insurance Gap: Challenges & Solutions

Introduction: The Cyber Insurance Dilemma Cyber insurance was once seen as a safety net for businesses, offering financial protection against [...]

Phishing Attacks in Schools: How Cybercriminals Target Staff & Students

Introduction: Schools Are a Prime Target for Phishing Attacks Cybercriminals love targeting schools. Why? Because schools manage sensitive student data, [...]

Overview of the NCSC Guidance on Risk Management 

The National Cyber Security Centre (NCSC) guidance on Risk Management provides a structured and practical framework for understanding, assessing, and [...]

How Cyber Essentials Changes Cyber Insurance for the SME Community

How the “Free” Cyber Insurance with Cyber Essentials Changes the Game for SMEs For SMEs and SMBs, getting cyber insurance [...]

VCs & Cyber Due Diligence: What Investors Now Expect from Startups

Introduction: Cybersecurity is Now a Funding Requirement Venture capital (VC) firms are no longer just evaluating revenue potential, product-market fit, [...]

Why Traditional Vendor Risk Management Fails: Moving Beyond Checklists

Introduction: The Vendor Risk Blind Spot Vendor risk management (VRM) has become a critical concern for enterprises, but many organisations [...]

Supply Chain Risk Mitigation: A Necessary Priority for 2025

In his article "Supply Chain Risk Mitigation Must Be a Priority in 2025" (19 December 2024, Dark Reading), Chief of [...]

Go to Top