• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From cydea.com

How does DORA differ to ISO 27001? — Cydea

1 1

Gain an understanding of your DORA compliance by taking our DORA Readiness Quiz. The EU Digital Operational Resilience Act, commonly known as DORA, will come into force in just a few short months, so organisations within scope will have to be prepared before January 2025.

#dora #cyber #iso27001 #compliance #resilience #positivesecurity

on Sep 5

From cydea.com

What makes a good risk assessment? — Cydea

0 0

A risk assessment is widely regarded as the foundation for any cyber security programme. It features in government guidance, international standards, and wider good practice.

on Oct 31

From cydea.com

How DORA could have changed history? — Cydea

0 0

Gain an understanding of your DORA compliance by taking our DORA Readiness Quiz. In a few short months, the Digital Operational Resilience Act (DORA) will come into effect for organisations operating in the European financial sector.

on Oct 29

From cydea.com

Cydea chosen for Cyber Runway Scale, among the UK’s most innovative, high-growth cyber companies — Cydea

0 0

We’re thrilled to announce that Cydea has been selected for Cyber Runway, the UK’s largest cyber accelerator, for companies addressing some of the biggest challenges facing cyber security.

on Sep 10

From cydea.com

From Lecture Halls to Client Calls: Getting Started in Cyber Consulting — Cydea

0 0

Academia to Consulting Transitioning from the academic world to a consulting role in cyber security was a leap into the unknown.

on Jul 24

From cydea.com

Risk Advisory: CrowdStrike update causing Windows ‘blue screens’ — Cydea

0 0

Cydea’s risk advisories are intended for senior management to aid their understanding of current events and the cyber risk posed to their organisations.

on Jul 19

From cydea.com

Security Operations Advisory — Cydea

0 0

Modern organisations need to combine preventative security controls with effective and efficient detection and response to protect against cyber security threats.

on May 21

From cydea.com

Introducing... Cydea Risk Platform — Cydea

0 0

On Wednesday evening, at the Soho Hotel in London, we launched Cydea Risk Platform, a software-as-a-service product to help organisations achieve better security outcomes.

on Apr 19

From cydea.com

Cydea Risk Platform — Cydea

0 0

Close the loop on cyber risk Track and manage your risk. Improve cyber risk conversations. Comply with frameworks. Learn from security incidents.

on Apr 18

From cydea.com

Cyber Assessment Framework (CAF) — Cydea

0 0

The NCSC’s Cyber Assessment Framework (CAF) is an initiative aimed at helping organisations running essential services and critical infrastructure achieve an appropriate level of cyber resilience.

on Mar 2

From cydea.com

The maths explained series: compound risk calculations to show overall risk profiles — Cydea

0 0

In What do you do when there’s more than one risk? I talked about why, when you want to consider multiple risks together, you can’t just add them together.

on Feb 7

From cydea.com

Exploring the potential threats to multi-factor authentication — Cydea

0 0

The limitations of Multi Factor Authentication Multi Factor Authentication (MFA) is something we hear about constantly. From securing personal accounts to protecting enterprise systems, the use of MFA has become widespread in order to protect personal and business data.

on Jan 25

From cydea.com

Precision vs accuracy in risk assessments — Cydea

0 0

The concept of precision versus accuracy comes up across many industries, and is ultimately the same set of principles used in relation to data and how it is used.

on Dec 19

From cydea.com

What do you do when there’s more than one risk? — Cydea

0 0

What do you do when there’s more than one risk? Let’s do a little thought experiment. Imagine that you’re in charge of controlling cyber security risks in your organisation, and that you can only afford to implement one control this quarter.

on Dec 6

From cydea.com

Why is everyone talking about zero trust? — Cydea

0 0

You might have heard people saying: “Never trust, always verify”. It suggests that, by default, users or devices should not be trusted, even if they have been verified previously.

on Nov 28

From cydea.com

The human element in cyber risk — Cydea

0 0

According to research by security firm Tessian and Professor Jeff Hancock, 85% of data breaches take place due to employee errors.

on Nov 15, 2023

From cydea.com

Positive Security — Cydea

0 0

Technology has changed the world, and made us better connected than ever before. Over 5 billion people now have a mobile device, public services are getting easier to use, entire new business models have sprung up.

on Oct 19, 2023

From cydea.com

Testing your organisation's response to cyber incidents — Cydea

0 0

It’s 7:30am. You wake up to 17 missed calls and a dozen messages from staff saying they’re locked out of their machines, and all they can see is a message asking for 50 bitcoins to decrypt the company’s data.

on Oct 17, 2023

From cydea.com

Careers — Cydea

0 0

We’re an optimistic cyber security consultancy. You’re (an aspiring) expert in security, data, tech and design that wants to build a safer, more secure world.

on Oct 3, 2023