Videos, factsheets, case studies and white papers to help you develop your cyber security and risk mitigation strategies.
Watch our video for an introduction to the many benefits of the Quod Orbis CCM (Continuous Controls Monitoring) managed platform.
Latest cyber security and risk insights, analysis and thought leadership delivered to your inbox.
A cacophony of complications has meant that businesses are struggling to implement a security plan that offers the assurance they need that defenses can prevent cyber-attacks Increased regulation, higher customer expectations, investment in emerging technology and expanded risk management have placed potentially detrimental pressure on budgets. Coupled with that is the need to be agile […]
Gartner identified the Top 7 Cyber Security Trends of 2022 – so how can Continuous Controls Monitoring support these emerging trends?
Our networks are rich with data and the explosion that has occurred, particularly before, during and after covid, has caused severe consequences in many businesses as IT teams struggle to move, store, analyse and protect a business’s prized asset. An IDC report in 2018, predicted that the global data sphere would grow to 163 zettabytes […]
What keeps GRC professionals like you awake at night? If you’re anything like most of the other GRC professionals to whom we regularly speak, it’s a question with a very simple answer: the inadequacies of your organisation’s GRC platform. Which matters, a lot. Because to the modern organisation, solid capabilities in governance, risk management, and […]
The Payment Card Industry Data Security Standard (PCI DSS) ensures secure payment card data and encourages global adoption of consistent data security measures. Anyone that is involved in payment card account processing needs to ensure that data is stored, processed and transmitted securely. Our Infographic focuses on the 8 biggest changes that you will need […]
If your organisation accepts card payments—think Visa, Mastercard, American Express and so on—then you’ll know it has to comply with the Payment Card Industry Security Standards Council’s PCI Data Security Standard version 3.2.1 (PCI DSS v3.2.1). No ifs. No buts. If your organisation accepts card payments, then compliance is a requirement. And of course so […]
The ever-growing number of cyber alerts and resultant ‘alert fatigue’ is creating a vicious cycle that can turn into crisis situations for business leaders. But, before we look at evidence of the scale and severity of alert fatigue—and the attendant high cost for businesses—here’s the true and salutary story of Jake. It demonstrates just how […]
In your organisation, who is responsible for cyber risk? As organisations grow the answer to this question becomes less clear. In smaller organisations a single person inevitably looks after security and as decisions are mainly based upon perceived risk then they also manage cyber risk. But as organisations grow these roles get split. Naturally the […]
Increasingly, businesses have two supply chains. There’s the familiar physical supply chain, along which physical goods flow—and then, in parallel, there’s an information supply chain, along which data flows. But not always just data. Because connecting a business’s IT systems to those of its customers and suppliers can expose the business to threats, as well. […]
For internal audit functions, a worrying circularity occurs when auditing IT controls. And it’s this: to obtain the data that the audit function needs to check, it is necessary for them to go to a plethora of different business functions and request it. In other words, the controls being audited, are owned by the very same […]
There is little debate about most facets of an effective cyber security strategy. Should it dovetail with the IT strategy, for instance? Of course. Should it complement the overall business strategy? Without doubt. Should it secure as many IT and data assets, end points and services as is pragmatically possible? Naturally. And so on, and […]
Quite rightly, many businesses—and their IT security specialists—are concerned about ransomware attacks. 2021 saw a number of high-profile attacks, with the threat showing no sign of abating in 2022. And, locked out of their systems, their data, and their networks, businesses have few easy choices left open to them. Many seriously consider paying up. However, […]
Application Security which is sometimes shortened to ‘AppSec’ – is an increasingly important Cybersecurity field, especially considering the growing variety and number of online buying and selling activities and platforms. These different ecommerce activities may be carried out on websites, through online games, apps or via smart home devices. Application Security encompasses all the security […]
Cyber security and risk management spending is forecast to grow yet again in 2021, putting even further strain on businesses and their profits. But should boardrooms accept the need for bigger and bigger budgets, or look for more effective solutions? Talking to CEOs, CFOs and CISOs regularly, as we do, it’s clear they’re not happy […]
Cyber security is a real-world, evolving challenge. Businesses need to stay on top of advances in technology and digitisation, as well as increased regulatory requirements and changes in the cyber threat landscape. With cyber-attacks increasing in scale and severity, organisations are starting to prioritise strategies to mitigate their risk. This was a challenge that Paysafe, […]
3 things every senior executive must understand about cyber security — including how Continuous Controls Monitoring (CCM) is the new de facto for easing cyber pain When Gartner named ”cybersecurity control failures” top of the list of executive concerns in its global Emerging Risks Monitor Report, was anyone really surprised? Business executives probably just experienced […]
Chances are, your organisation is reasonably comfortable with how it manages cyber security risk. Because—let’s face it—we all know that cyber security risks are very real, and the consequences of a cyber security breach can be very serious and costly. Successful organisations—at least those that want to continue to be successful—are, more than ever before, […]
“Asset visibility” is a recognised core concept in Information Security and there are few factors which are more important today than knowing exactly what you have in your estate. Assets can be anything from physical devices also known as hardware, buildings or other infrastructure and non-tangible resources for example cloud resources, and data. Gaining asset […]
So, with Troy Hunt proclaiming that EV is dead, is this actually true or just one-man (well probably more than just Mr Hunt) campaign? Background As a recap / piece of history, EV (Extended Validation) Certification, is basically the top level for SSL certificates (all known as the “gold standard”) which requires the Certificate Authority […]
The Assurance That Organisations Need to Have and Provide With the advent of the coronavirus (COVID-19) and the government’s mandate stipulating self-isolation, restriction in movement and social distancing, organisations can expect to reduce the impact in productivity by enabling the ability to provide remote working for their employees. But what does remote working mean and […]
Keep up to date with the latest CCM and cyber and risk news and views, to hear about Quod Orbis events, and to access white papers on digital risk management, cyber security and related topics.