+44 (0)203 88 020 88

Menu

Search

Security operations

What is the Cybersecurity Maturity Model?

The Cybersecurity Maturity Model provides a way for organisations to assess their cyber security processes and capabilities with a focus on defending against Advanced Persistent Threat actors. The Cybersecurity Maturity Model Certification (CMMC) was developed by Carnegie Mellon and Johns Hopkins at the request of the US Department of Defence and was launched in March […]

What is the Cybersecurity Maturity Model? Read More »

What is Cyber Supply Chain Risk Management?

Recent high-profile security incidents, such as the compromises at SolarWinds and CodeCov and the vulnerabilities in Microsoft Exchange Server, have drawn attention to the risks posed by the software we invite into the heart of our networks and often trust implicitly. The processes and procedures for identifying and mitigating the risks posed by these third-party

What is Cyber Supply Chain Risk Management? Read More »

Compromise of Codecov dev tools affects thousands of customers

An unauthorised change to a script used by Codecov customers to upload software test results has stolen the credentials and API tokens for thousands of organisation’s development environments. Codecov is a tool used to track what percentage of an application’s source code has been exercised during software testing. To do this, it is integrated into the

Compromise of Codecov dev tools affects thousands of customers Read More »

0

No products in the basket.

No products in the basket.