Resources

Our definitive guide to threat intelligence

Our definitive guide to threat intelligence

Our definitive guide to threat intelligence provides everything you need to know about implementing and using threat[…]

Data-Protection Best Practices for Regulated UK SMBs

Data-Protection Best Practices for Regulated UK SMBs

Fifteen Data-Protection Best Practices for Regulated UK SMBs Why another best-practice list? Specifically, why 15 data protection[…]

Malware and Ransomware Resilience for SMBs

Leadership Guide to Malware and Ransomware Resilience for SMBs

A leadership guide to malware and ransomware resilience for SMBs (without breaking the bank) Malware and ransomware[…]

UK's Software Security Code of Practice

Part 4 of: Aligning with the UK’s Software Security Code of Practice

Communication with Customers – A Technical and Strategic Guide to Secure Software Transparency Background and Structure This[…]

UK's Software Security Code of Practice

Part 3 of: Aligning with the UK’s Software Security Code of Practice

Secure Deployment and Maintenance – A Technical Implementation Guide for Leaders and Engineers Purpose To ensure that[…]

UK's Software Security Code of Practice

Part 2 of: Aligning with the UK’s Software Security Code of Practice

Build Environment Security – A Technical and Organisational Implementation Guide Overview This section of the UK government’s[…]

UK's Software Security Code of Practice

Part 1 of: Aligning with the UK’s Software Security Code of Practice

Design and Development – A Technical and Organisational Implementation Guide Overview The Secure Design and Development section[…]

Threat Modelling for Risk Management in Small to Medium-Sized Businesses

Threat Modelling for Risk Management in Small to Medium-Sized Businesses (SMBs)

Introduction In the evolving threat landscape, small and medium-sized businesses (SMBs) are increasingly being targeted by a[…]