Blog

We regularly post our thinking here because ideas are best shared. It might be our approach to solving a problem (we’re not fans of reinventing the wheel!), perhaps simply something else entirely that has piqued our interest! We cover methods for cyber risk assessment, approaches for cyber risk quantification, tools and templates for cyber risk management, tips for running successful security programmes, and much more!

You can join us at @cydeaHQ on Twitter, or our LinkedIn page to discuss any of our posts. If you’d like to know each time we add a new post, you can subscribe for notifications and a few other choice bits of content.

...
Hello, World! from cydea.Tools

Introducing cydea.Tools, a collection of the tools we use in our client work and that are now freely available for any infosec team to pick up and accelerate their cyber security programme.

Continue reading...
...
Racial discrimination is systemic within information security

As I wrote in my weekly infosec newsletter over the weekend: You will, no doubt, have seen some of the horrific coverage of violence used against protesters this week… You may feel detached or removed from events however the issues are systemic and pervasive even in a ‘modern’ field like cyber security.

Continue reading...
...
Defense in Depth discuss 'what are you defending?'

Cydea’s founder, Robin Oldham, is featured on this week’s Defense in Depth podcast discussing asset valuation. Citing our blog post, Robin’s comments were picked up by David Spark and featured on the show.

Continue reading...
...
Five insights from the Security Watercooler

Last week we trialled an idea for running short video calls for people to share knowledge and experiences of different security topics.

Continue reading...
...
Security Watercooler: Communicating your recovery, with Jessica Lennard

This week we are trialling an idea around a virtual ‘Security Watercooler’. 25~30 min video calls to break up the day and showcase different viewpoints.

Continue reading...
...
Security Watercooler: Remote incident response, with ContextIS' Stephanie Albertina

This week we are trialling an idea around a virtual ‘Security Watercooler’. 25~30 min video calls to break up the day and showcase different viewpoints.

Continue reading...
...
Security Watercooler: Adapting detection to deal with remote working, with F-Secure's Tim Orchard

This week we are trialling an idea around a virtual ‘Security Watercooler’. 25~30 min video calls to break up the day and showcase different viewpoints.

Continue reading...
...
Security Watercooler: Focus during the distractions: security awareness at home, with ThinkCyber's Tim Ward

This week we are trialling an idea around a virtual ‘Security Watercooler’. 25~30 min video calls to break up the day and showcase different viewpoints.

Continue reading...
...
Security Watercooler: Cyber Risk Universe, with CISO Mentor's Phil Huggins

This week we are trialling an idea around a virtual ‘Security Watercooler’. 25~30 min video calls to break up the day and showcase different viewpoints.

Continue reading...
...
Join us at the Security Watercooler

This week we are trialling this idea: gather round the (virtual) Security Watercooler to share some knowledge, discuss ideas and chat with peers.

Continue reading...
...
Now is the time to secure those new remote working tools

The novel coronavirus COVID-19 has led to many countries around the world mandating that citizens practice social distancing and stay at home.

Continue reading...
...
We need your help to develop a better way to measure and manage cyber risk

At Cydea we believe in risk management should be consistent in its approach, informed by the data you have, and automated where possible.

Continue reading...
...
Cydea has Cyber Essentials

It’s important to practice what you preach. That’s why we’re proud to announce that Cydea has achieved Cyber Essentials certification. Cyber Essentials is a UK government-backed scheme to protect organisations from the most common cyber-attacks.

Continue reading...
...
Protect shareholder value using positive cyber governance

The board’s purpose is to successfully direct the company’s affairs and meet the needs of shareholders and stakeholders. We believe getting the following seven things right helps to establish effective cyber governance and are the foundation for a good security culture.

Continue reading...
...
Thinking about authentication

Modern authentication That way that people identify themselves is one of the most obvious security controls that they come into contact with.

Continue reading...