Blog

We regularly post our thinking here because ideas are best shared. It might be our approach to solving a problem (we’re not fans of reinventing the wheel!), perhaps simply something else entirely that has piqued our interest! We cover methods for cyber risk assessment, approaches for cyber risk quantification, tools and templates for cyber risk management, tips for running successful security programmes, and much more!

You can join us at @cydeaHQ on Twitter, or our LinkedIn page to discuss any of our posts. If you’d like to know each time we add a new post, you can subscribe for notifications and a few other choice bits of content.

...
Introducing... Cydea Risk Platform

On Wednesday evening, at the Soho Hotel in London, we launched Cydea Risk Platform, a software-as-a-service product to help organisations achieve better security outcomes.

Continue reading...
...
Cydea Launches Risk Platform to Quantify Risk Through Real-World Scenario Modelling and Fiscal Terms

UK company makes risk management tangible for CISOs and business leaders with revolutionary new risk mitigation approach LONDON, UK - 18th April 2024 – Cydea, the cyber risk management provider, has today announced the Cydea Risk Platform, set to revolutionise the field of cyber risk by quantifying threats in financial terms to businesses, allowing them to visualise the consequences of different business security-related scenarios.

Continue reading...
...
The maths explained series: compound risk calculations to show overall risk profiles

In What do you do when there’s more than one risk? I talked about why, when you want to consider multiple risks together, you can’t just add them together.

Continue reading...
...
Exploring the potential threats to multi-factor authentication

The limitations of Multi Factor Authentication Multi Factor Authentication (MFA) is something we hear about constantly. From securing personal accounts to protecting enterprise systems, the use of MFA has become widespread in order to protect personal and business data.

Continue reading...
...
Precision vs accuracy in risk assessments

The concept of precision versus accuracy comes up across many industries, and is ultimately the same set of principles used in relation to data and how it is used.

Continue reading...
...
What do you do when there’s more than one risk?

What do you do when there’s more than one risk? Let’s do a little thought experiment. Imagine that you’re in charge of controlling cyber security risks in your organisation, and that you can only afford to implement one control this quarter.

Continue reading...
...
Why is everyone talking about zero trust?

You might have heard people saying: “Never trust, always verify”. It suggests that, by default, users or devices should not be trusted, even if they have been verified previously.

Continue reading...
...
The human element in cyber risk

According to research by security firm Tessian and Professor Jeff Hancock, 88%** of data breaches take place due to employee errors.

Continue reading...
...
Even if your data’s in the cloud, its security is still your problem

“We don’t need to have our own encryption keys, all of our data is in the cloud.” Cloud services are a useful resource for shifting CapEx (capital expenditure) requirements to OpEx (operational expenditure).

Continue reading...
...
What is multi-factor authentication?

In today’s increasingly interconnected world, the need for robust cyber security has never been more critical. As cyber threats continue to evolve, organisations are looking at different ways to protect their digital assets.

Continue reading...
...
Testing your organisation's response to cyber incidents

It’s 7:30am. You wake up to 17 missed calls and a dozen messages from staff saying they’re locked out of their machines, and all they can see is a message asking for 50 bitcoins to decrypt the company’s data.

Continue reading...
...
The importance of supply chain security

All businesses have a supply chain, no matter what size of business you are. As businesses grow, their supply chain is likely to grow even further.

Continue reading...
...
Autonomous vehicles and their cyber security

They may not be quite like Glen A. Larson depicted them in the 80’s TV series “Knight Rider”, but autonomous vehicles are here.

Continue reading...
...
What is social engineering?

“Social engineering” is when threat actors use manipulation and deception to persuade a victim into doing either revealing something (such as credentials) or doing something (such as transferring money).

Continue reading...
...
We're making changes to the way you login to our risk app

This message has been sent to all early adopters of our risk app. It’s replicated here so that you can verify the authenticity of the reset request that will follow.

Continue reading...