News & Insights
- Capacity Building
- Cyber attack
- Cyber security
- Data protection
- Digital Threat Digest
- Geopolitical Risk
- Incident Response
- Information security
- ISO 27001
- PCI DSS
- Penetration testing
- Risk portal
- Social Media Intelligence
How to mitigate third-party digital risk
Every organisation is facing digital risks; whether that’s criminal-led (the most common), state-led…Read More
What Is ISO 27002 and why does your business need ...
The International Organization for Standardization (ISO) recently released an update to the ISO/IEC…Read More
Why choose ISO 27001 over other information securi...
ISO 27001 is one of the best known and most recognised internationally agreed set of standards for t…Read More
What’s the point of a cyber security maturity asse...
Dr Meredith Patton, Director of Cyber Operations with Keith Buzzard, Chief Technology Officer At wor…Read More
5 ISO 27001 myths that make the Standard seem expe...
Here are the 5 ISO 27001 myths stopping organisations getting the most from the Standard, that our H…Read More
The challenges of PCI DSS compliance
Instead of regarding PCI DSS as an overhead to be avoided, organisations should regard it as a valua…Read More
Twittergate: This time you can’t blame technology
Cyber attacks aren't always as simple as a technological failing, human error is a large element of…Read More
The importance of Identity and Access Management
A robust IAM process is a crucial part of any information security management system—it ensures a us…Read More
Use lockdown to boost your information security ca...
Preparing for the next step in your career is easier said than done. CPD and other professional deve…Read More
Simplifying your DSPT submission [Infographic]
There are steps you can take to reduce that burden and PGI can work with you to help identify what a…Read More