We’ll send you a free report on where you need to focus your improvement efforts
A paper for Senior Information Risk Officers (or equivalent) and their advisors
The Ascentor guide to a cyber safe summer holiday
The OT and IT debate – is our critical infrastructure safe?
Choosing and managing data processors to comply with GDPR
The NIS Directive explained – compliance and guidance
Measuring and understanding cyber security effectiveness – where do you start?
What can you do when a patch goes wrong?
A look back at cyber security in 2017
GDPR: What does the Regulation require when capturing consent?
The one-stop guide to cyber security advice (Part 2)
The one-stop guide to cyber security advice (Part 1)
GDPR: Do you really need a Data Protection Officer (DPO)?
Convince your board – cyber attack prevention is better than cure
Ransomware attacks – don’t let them happen to you
Why basic cyber security could save you a lot of wonga
Ascentor expands capabilities on Digital Outcomes and Specialists 2
‘Not if but when’ – 2017 UK cyber security in focus
Cyber security in perspective – a look back at 2016
Cutting through the confusion: GDPR and Brexit
Cyber Insurance – can you ever be fully covered?
Reflections on CyberUK in Practice – CESG’s government security conference
Cyber security training for the procurement profession – strong on theory, weak in practice?
5 ways to spring clean your cyber security
Cutting through the confusion: Government Information Assurance changes explained (part 3 of 3)
CLAS Consultancy is dead – long live the CCSC scheme?
Data Protection – your ‘need to know’ list is getting longer
2016 cyber security predictions for government organisations and the supply chain
MOD Suppliers – the new Cyber Essentials requirements explained
2015 – The year of constant and relentless attack
IA15: Public trust in networks and data depends on security
The Human Face of Information Risk Re-visited
Do you need to TalkTalk about cyber security?
The cyber skills shortage gap – taming the perfect storm
Defence as a Platform will transform MOD procurement – but who will champion Information Assurance?
Ascentor joins the Cyber Security Supplier to Government list