Trusted Advisor How to meet the EU Digital Operational Resilience Act (Dora) EU regulators can summons financial services boards, temporary or permanently shut down a financial entity's operations or publicise any breach.
Cybersecurity €15Million fines and the EU Cyber Resilience Act (CRA) This act is ground breaking. It’s going to place the EU at the heart of driving hardware and software cybersecurity assurance world-wide.
Trusted Advisor First Board Level Cybersecurity course successfully delivered! What a great feeling, our first Board Level Cybersecurity course successfully delivered! Our favourite feedback: "The course was excellent awesome content"
Trusted Advisor Board level cybersecurity warning signs End of life systems should be a major concern for any board. What are you doing to manage the ICT risks associated?
Cryptanalysis NIST Elliptic Curve $12k bounty Dive into the NIST elliptic curve controversy and the $12k NSA bounty. Understand cryptographic implications and security concerns.
Trusted Advisor Board Level Cybersecurity course A short five hour expert-led course on Cybersecurity for senior executives delivered by Jonathan Evans.
Cybersecurity LinkedIn Smart Links being used to Phish Well worth 3 minutes of your day to read and adding to your security awareness training.
Cybersecurity NSA and CISA Top 10 Cybersecurity Misconfigurations Explore NSA & CISA’s top 10 cybersecurity misconfigurations and learn how to mitigate risks with expert assessments and best practices.
Cryptanalysis Crypto Wallet Password Recovery Useful tips on how to go about recovering a crypto wallet password containing crypto-currency such as Bitcoin or Ethereum in as safe a manner as possible.
Cybersecurity How to fix security vulnerabilities Fix security vulnerabilities through automation, simplification and improved reporting.
Cryptanalysis Microsoft blocked scam Targeted by the 'Microsoft Blocked' scam? Discover how attackers used vishing and remote access—and how cryptanalysis restored access.
Cybersecurity Are you Phishing Blind? If you think you are ‘phishing blind’ then this article is for you and has some techniques to help you recognise and minimise the risk that others perceive automatically.
Trusted Advisor How to protect against hackers An overview of the threats companies face and how those threats ultimately compromise companies. IT Security Locksmith provide a Board Level Trusted Advisor Practical Cyber Security course to help senior executives understand this complex subject in easy-to-understand plain English.
Cybersecurity How do I improve my company's cyber security? An overview of three methods to improve a company's cyber security depending on your current level of maturity.
Cryptanalysis How to perform encrypted file recovery Recover access to encrypted files with expert help. Learn how cryptanalysis supports legal, operational, and e-discovery file recovery.