Cyber

Insider Threats In Your Organisation

Robert Wilson

Insider Threats in your organisation – Monitoring and Prevention Strategies In today’s interconnected digital world, businesses face an increasing array of cybersecurity threats, and among the most challenging to combat are insider threats. Insider threats are potential risks posed to an organisation’s security by its own employees, contractors, or business partners who have authorised access ... Read more

NorthCap Enters The Private Equity Arena

Robert Wilson

NorthCap Cyber enters the Private Equity arena  NorthCap Cyber, a Private Equity focussed practice and partner organisation of Amicis officially launches its market offering.  Crafted to harmonise with the complete investment lifecycle, our Portfolio Company Cybersecurity Assessment Program minimises potential risks to portfolio value and profit, while delivering a clear, comprehensive view of cybersecurity maturity ... Read more

Securing Medtech

Robert Wilson

Securing Medtech IOT security, and medical devices in particular, have come under intense scrutiny in recent years for the cyber risks that surround them.  Given the nature of what they are responsible for, and the severe consequences of breaches to sensitive medical data, operating these devices requires considerable effort to mitigate the associated risks.  In ... Read more

Penetration Testing – Why, When, How

Robert Wilson

Penetration Testing – Why, When and How Penetration testing brings value and informs critical business decisions in a wide variety of scenarios.  Below, we highlight several instances where utilising this service   to secure their key technology systems and thereby help fuel business innovation and growth.  They also demonstrate the need to undertake this regularly ... Read more

NIST Framework Updates

Robert Wilson

NIST framework updates Last week, the National Institute of Standards and Technology (NIST) released a draft version of their Cybersecurity Framework (CSF) 2.0.  Below we analyse the changes, what they could mean for your organisation and the opportunities they present. Credit: N. Hanacek/NIST While the five key NIST pillars of Identify, Protect, Detect, Respond and ... Read more

Analysing The Impact Of DORA

Robert Wilson

Exploring DORA: Analysing the impact of the Digital Operational Resilience Act The Digital Operational Resilience Act (DORA) has recently come into force.  We have looked at the problems it is helping infosec professionals solve and the opportunities it provides. The purpose of DORA is to address risks posed by the financial sector’s reliance on third-party ... Read more

New Modules Added To PTaaS

Robert Wilson

Amicis are excited to add two new modules to our penetration testing as a service (PTaaS) – web application and web services now sit alongside infrastructure testing and vulnerability scanning as service lines which can be scoped, scheduled, delivered and reported on in a fraction of the time compared to traditional methods of penetration testing.All ... Read more

Dissecting The UK Cyber Skills Report 2023

Robert Wilson

At the end of July, the Department for Science, Innovation and Technology (DSIT) and Ipsos published a report analysing the UK cyber security labour market. We explore key themes coming out of the report, specifically what a business who lacks the necessary cyber skills, knowledge or capability should consider in order to avoid missed opportunities ... Read more

The Business Benefits of Penetration Testing

The Business Benefits of Penetration Testing

Robert Wilson

As more businesses take further steps up the cyber resilience ladder, typically due to their growth, they eventually end up needing or wanting to explore the business benefits of penetration testing.  Below we explore some of the key benefits to organisations of conducting Penetration Testing “pen tests” regularly. Our Benefits List for Considering Penetration Testing ... Read more

Learning To Combat Cyber Threats

Robert Wilson

What are the greatest cyber threats to Training organisations? With L&D organisations holding so much personally identifiable information, they are a highly attractive target for threat actors.  Furthermore, for those operating in the funded learning or Apprenticeships space, there is an enormous level of auditing and compliance measures requiring continued maintenance. What do training organisations ... Read more

Ready to get started?