Ideation to Execution: Building Your AI Governance Framework

AI Governance Framework

AI governance is the foundation of responsible AI usage. It’s a framework of policies, practices and guidelines that shape how organisations build, implement and oversee AI systems. Effective AI governance balances advancements with risk management, guiding teams to meet regulatory standards whilst promoting accountability and transparency in AI-driven decisions. With a solid governance structure in […]

Get Ahead of the UK AI Regulation: Comply and Thrive

UK AI Regulation

As artificial intelligence continues to reshape the way we all work and how enterprises operate, UK organisations face a critical challenge: adapting to emerging AI regulations. Along with this challenge comes the opportunity to excel by leveraging AI to innovate business functions. Information security and technology leaders should look to prepare now for regulations by […]

Maximising Security and Efficiency with CISO-as-a-Service

CISO-as-a-Service

Many organisations are turning to implementing a CISO-as-a-Service option. The service is not only efficient, cost-effective and flexible — but also provides a dedicated CISO who has access to a panel of ‘in-house’ information security experts. The service allows organisations to maximise their security posture to mitigate risk and adhere to regulatory requirements. Additionally, the […]

Mobile Banking Apps: The Risks, Threats and Solutions

mobile app security

Mobile banking apps have become the new normal for millions of people around the world, offering convenience, flexibility, and accessibility to manage finances from anywhere at any time. But with this increased reliance on mobile banking comes a greater risk of security breaches, exposing your financial data to cybercriminals. In this article, we shall explore […]

How to Outsmart the DarkSide Ransomware Group

DarkSide Ransomware

The DarkSide Ransomware Group is one of the many gangs that continue to rebrand themselves while expanding to gain more intelligence in 2022. So, is there any way to outsmart these groups? It almost seems like a losing battle. However, a strong defence can be created within your organisation, but first, it’s important to start […]

“Cryptic Clouds” Hacker’s Compromise Google Cloud Accounts to Mine Cryptocurrency

Picture showing Google logo and a cloud

Threat actors are actively exploiting a misconfigured Google Cloud Platform (GCP) infrastructure to mine cryptocurrency. Google’s recent threat horizon report detailed that out of 50 recently compromised GCP instances, 86% were used for crypto mining. Statistics show that 48% of intrusions were the result of poor password hygiene and or insecure API configurations. However, 26% […]

Ransomware Threat Actors Turn to Target the Cloud

Ransomware threat actors

As expected, in Q2 this year, cyber criminals shifted their focus to cloud-based apps. A report by Netspoke revealed that 68% of all downloads with malware attached, were dispersed from cloud apps. Now that companies heavily rely on cloud-based services for connectivity and collaboration purposes to support working from home environments – attackers are turning […]

Hiring a Virtual CISO Verses a Full Time CISO Comparison

Virtual CISO

Most of us are aware that there is a huge gap of qualified cyber security talent available to hire. A 2023 study commissioned by the Department for Science, Innovation and Technology (DSIT) identified that a striking 50% of all UK businesses have a fundamental gap in cyber security skills. With this staggering statistic, it’s no […]

Risk & Compliance Predictions for 2021: A Not to Miss Webinar

If change is the only constant in cyber security, then what will the year ahead of us bring? How can we prepare for ever-evolving threats?   Register for the webinar: Risk & Compliance Predictions for 2021 The session will cover: The challenges of greater enforcement Ransomware and the next generation of threat vectors What boards […]

Risk Crew