Dynamic Cybersecurity: Latest Trends and Updates

In today’s interconnected digital world, the field of cybersecurity is constantly evolving to keep up with emerging threats and vulnerabilities. Staying updated with the latest developments is crucial for individuals and organisations alike to protect their...

Penetration Testing vs. Red Teaming engagements: Key Distinction

Finding the right security service to assess your organisation is a critical aspect of any security program. Each security service has its benefits and fits a specific purpose, and it is important to therefore understand the differences between these services to...

PCI DSS 4: eCommerce Changes for SAQ A Explained

The recent PCI DSS v4.0 has some important changes for eCommerce merchants that use a redirect or iframe to reduce scope to Self-Assessment Questionnaire A (SAQ A). Even though the merchant’s website that meets the criteria for SAQ A does not transmit account data,...

ISO 27002:2022 Update – New Annex Controls Explained (Part 2 of 2)

  This is the second of two parts of our publication, looking at the new section 8 controls of the ISO 27002:2022 update. Please refer to part one for section 5 and section 7 controls. In part two of our post, we will cover: Configuration Management (8.9) Data...

Purple Team Assessments: How to evaluate it

Author: Mike Manzotti – Principal Consultant at Dionach Changes in the threat landscape combined with the needs of the modern enterprise often come with the requirement for IT staff to be able to respond to cyber security incidents 24/7. These changes have...