We’ll send you a free report on where you need to focus your improvement efforts
A paper for Senior Information Risk Officers (or equivalent) and their advisors
How to pass Cyber Essentials PLUS first time
The NIS Directive explained – compliance and guidance
A look back at cyber security in 2017
How to prepare your company for achieving List X
Ascentor expands capabilities on Digital Outcomes and Specialists 2
‘Not if but when’ – 2017 UK cyber security in focus
The UK Cyber Security Strategy 2016-2021 – A New Sheriff in Town?
Cyber security in perspective – a look back at 2016
The Future of Information Assurance Accreditation
Supply Chain Cyber Security – defeating the weakest link (Part 1)
Passwords? It’s enough to give you a headache
Reflections on CyberUK in Practice – CESG’s government security conference
Cutting through the confusion: Government Information Assurance changes explained (part 3 of 3)
CLAS Consultancy is dead – long live the CCSC scheme?
2016 cyber security predictions for government organisations and the supply chain
MOD Suppliers – the new Cyber Essentials requirements explained
2015 – The year of constant and relentless attack
IA15: Public trust in networks and data depends on security
Cutting through the confusion: Government Information Assurance changes explained (part 2 of 3)
Ascentor joins the Cyber Security Supplier to Government list
Government Information Security
Understanding the new, more simplified PSN compliance
Cutting through the confusion: Government Information Assurance changes explained (part 1 of 3)
What is ‘IL3’ and why are so many searching for it?
The Demise of IS1 & 2 – Are Risk Assessments Really Worth the Effort?
Could the new OFFICIAL classification be your ’50 Shades of Grey’?
G-Cloud 6: Accreditation is dead – long live Assertions!
IA Inside – building Information Assurance into the heart of your projects
Information Security Predictions for 2014
Tips for Security Assurance Coordinators on MoD projects
Balancing Information Risk With Commercial Opportunity
The Government Protective Marking Scheme – a Case of the Emperor’s New Clothes?
Learning From the Experts – Tips from the 2013 Information Assurance Practitioners’ Event
What’s New in Cyber Security for 2013
G-Cloud Security: Useful Tips for IL3 Accreditation
G-Cloud Security: Useful Tips for IL1/2 Accreditation
Vital Information Security Tips for Every Project Manager
IL0, IL1/2, IL3? Busting the G-Cloud Accreditation Security Jargon
Five Steps to G-Cloud Accreditation
Information Assurance for PSN – CAS(T)
Top Tips for Government Security Leads – Part 3
Information Assurance for PSN – the PSN CoCo
Top Tips for Government Security Leads – Part 2
Public Services Network (PSN) Accreditation – The Process Explained
Top Tips for Government Security Leads – Part 1
Ascentor’s 5 Minute Guide to IAMM
What information, where? The first step in Information Risk Management
Protect Your Systems from Cyber Threat with 7 Basic Security Controls
What Every Government Supplier Needs to Know About the UK Cyber Security Strategy
Why Information Security Will Rocket to the Top of Your ‘To Do’ List this Year
Information Risk is NOT Just an IT Issue
How Much Security is Enough for Government Systems?
Demystifying the Accreditor Role: Think Referee