About the Company Agrimetrics, founded in 2014, is a leading Agri-tech Centre dedicated to revolutionising the agrifood sector through a thriving Data Marketplace that facilitates the sharing, monetisation, and accessibility of data. With a strategic goal of feeding 10 billion people by 2025, Agrimetrics has been at the forefront of utilising data for its operations […]
In an information or cyber security context, a Red Team is a group of ethical hackers that design and execute a series of coordinated technical and social engineering attacks on an organisation’s people, processes, and technology to simulate how an intruder could obtain unauthorised access to its systems or information assets. In simple terms, a […]
Guest Contributor: Benjamin Turner, Chief Operating Officer, Agrimetrics Shortly after Russia’s invasion of Ukraine, I advocated in a BBC news article and North American technology podcast (The Feed) that we should regard parts of the UK’s agriculture and agrifood system as critical national infrastructure. What does it mean to be critical national infrastructure, and why […]
“There has been a 742% average annual increase in software supply chain attacks over the past 3 years”[i] The above statistic might seem implausible, but supply chain cyber attacks have become a pressing issue for businesses as the reliance on technology and interconnected systems have grown. These attacks can compromise sensitive information, disrupt operations, and […]
The TIBER-EU Framework refers to Threat Intelligence-Based Ethical Red Teaming. The European Central Bank (ECB) created the framework in March 2018 as a response to the increasing number of cyber threats specifically facing the financial sector and the urgent need for a more coordinated, sophisticated, and comprehensive approach to managing cybersecurity risk. The framework’s goal […]
A common question that comes up when implementing ISO 27001 is: Should I include security penetration testing in my Information Security Management System (ISMS) programme to comply with the ISO 27001 standard and meet auditor expectations? The answer is both yes and no — depending on how you look at it. The standard does not […]
Ransomware is a type of malware that encrypts files and then seeks payment in exchange for the encryption key. A ransomware readiness assessment is an audit that businesses can undergo to determine their risk level for ransomware. The assessment will help you identify which areas of your organisation are at the highest risk for attack […]
When looking to embark on achieving ISO 27001 Compliance, every organisation should know what challenges are ahead, in order to overcome them. It doesn’t have to be that hard if you know the hurdles. Risk Crew would like to share some tips to jump the hurdles when it comes to building your Information Security Management […]
The revised version of ISO 27001 finally landed on 25 October 2022. It’s been almost 10 years since the last major update, and while the revisions may seem minor, they are in fact significant and serve to both solidify and clarify the standard. In this post, we’ll cover what changed, why the new version was […]
Documenting your information security management system (ISMS) for evidence of compliance with the ISO 27001:2022 standard can be confusing as it is not clear which documents are mandated and which are discretionary. Consequently, most of us overcompensate and produce far more paperwork than we need causing redundant and conflicting policies to confuse our stakeholders, staff […]