Written by Suzanne Donovan, Senior Security Consultant for Savanti, part of FSP

Read More

Protecting Your Digital Infrastructure Written by Ryan Perrin, Senior Security Consultant for Savanti, part of FSP

Read More

Richard Brinson and Rachel Briggs OBE

Read More

Richard Brinson and Rachel Briggs OBE

Read More

Boards are increasingly concerned about cyber security, ranking it as one of their top priorities, and for good reason. The cyber security risk is growing, [...]

Read More

Introduction

Read More

... and what good looks like

Read More

...and how to get it right

Read More

Read More

Read More

Read More

Dave Pearcy, a senior cyber security consultant at Savanti, recently took his ISACA Certified Information Security Manager (CISM) exam and passed

Read More

Read More

At Savanti, our people are what make us special. That's why we recruit the best candidates and offer them the challenge of working with an exciting and [...]

Read More

In our latest blogs we've already covered 'The importance of data to organisations' and why 'Organisational culture' is so important. So we're done right?

Read More

'Savanti joins forces with leading consultancy FSP'

Read More

To change a habit, you need to make a conscious decision, and then act out the new behaviour.

Read More

A data-centric culture

Read More

Read More

The Hollywood view of cyber security gets all excited about zero-day exploits, but real incidents are all too mundane with hackers (or insiders) using [...]

Read More

When our perfect abstract model of how we'd like the world to be, meets messy reality - an archaeological dig of past attempts, ad-hoc pragmatism and [...]

Read More

It depends! Any account credentials which are the ‘keys to the kingdom’ are privileged and a high priority for protection from attackers or accidental [...]

Read More

Who doesn't love the promise of shiny new technology?

Read More

Our previous blog in this current series 'Demystifying DevSecOps' will have hopefully given you some critical thoughts and more understanding surrounding [...]

Read More

Read More

Read More

Read More

Read More

Read More

Following our recent blog 'Diversity and the role of security leaders' our very own Richard Beesly, Business Development Manager at Savanti scoops the [...]

Read More

A year on from the launch of the Decrypting Diversity 2020 report we are already looking forward to the findings from this year’s 2021 survey. A continued [...]

Read More

In our recent blog series that covers Identity and Access Management (IAM), we explore how improving IAM processes can unlock the potential of your [...]

Read More

Rome wasn’t built in a day and the same is true of a good Identity and Access Management (IAM) programme. When planning your IAM priorities for maximum [...]

Read More

Identity and Access Management (IAM) systems help ensure your staff only have the access they need. Without these controls for systems access your data & IP [...]

Read More

Successful companies are often made up of great people!

Read More

An effective Information Security Education and Awareness and Training (ISEA&T) programme empowers employees to recognise common cyber security threats, [...]

Read More

Savanti the problem solver!

Read More

With an abundance of cyber security advice readily available, many organisations find it hard to know where to begin. Additionally, communicating to [...]

Read More

The above title is contentious but is often how an organisation views their employee security awareness training. Employee cyber awareness should not be [...]

Read More

In our blog series on security assessments, we explored how assessments can be used to prioritise the 'known knowns' of cyber security risks, what makes [...]

Read More

Read More

Security assessments for cyber are all about understanding, managing, controlling and mitigating cyber security risk across your organisation. It's an [...]

Read More

As Donald Rumsfeld once said, there are “known knowns”, “known unknowns” and “unknown unknowns”.

Read More

Is it time you considered a different approach to security leadership?

Read More

Small and Medium Businesses (SMBs) are not immune to cyber-attacks, in fact they’re often deliberately targeted by hackers as they regularly fail to [...]

Read More

It's not uncommon to hear reference to “unicorns” when discussing candidates for the role of Chief Information Security Officer (CISO). Indeed, if finding [...]

Read More

A good security leader, whether a permanent Chief Information Security Officer (CISO) or an on-demand virtual CISO (vCISO) can help substantially improve [...]

Read More

James Smith, our Head of Consulting, is familiar with the challenges faced by security leadership and knows first-hand the impact good leadership can make, [...]

Read More

In this Talent Spotlight, we hear from Senior Security Consultant, Neil Ward, on how the worldwide lockdown is accelerating digital transformation and the [...]

Read More

As we move forward businesses are accepting the rapid changes they instigated during the initial response to the Coronavirus pandemic are likely to become [...]

Read More

If there was ever a time when this mantra should hold true in cyber security – then it’s now. At Savanti we believe the role of cyber security leaders and [...]

Read More

Amidst the COVID-19 pandemic, many organisations and people may be feeling anxious about the next few months, we hope to help remove a small portion of this [...]

Read More

Amidst the COVID-19 pandemic, many organisations and people may be feeling anxious about the next few months, we hope to help remove a small portion of this [...]

Read More

Gartner’s Four Pillars of Privileged Access Management (Pillar 1) tells us to “Track and Secure Every Privileged Account”.

Read More

What does good Privileged Access Management (PAM) look like? is the first question to answer when defining your implementation objectives.

Read More

Implementing Privileged Access Management (PAM)

Read More

Whether you're a leading global company or a small start-up, the data you hold and process is valuable to cyber criminals. This should be reason enough to [...]

Read More

A recent UK Government survey which detailed the costs and impacts of cyber attacks found (in the last 12 months): 61% of businesses were victims of cyber [...]

Read More

Accessing your data in order to get to know your customer better

Read More

Andrew Lock is a Savanti vCISO (Virtual Chief Information Security Officer). He was a copper for 15 years, ending up in cybercrime detection, so when he [...]

Read More

The payment transaction consists of critical customer data, representing a significant value opportunity to both the customer and the potential hacker. The [...]

Read More

Our high street retailers are very expensive! but far from dead!

Read More

Our high street retailers are not dead!

Read More

Savanti sees a Virtual Chief Information Security Officer (vCISO) as an outsourced person who performs the role of a CISO for clients on a part-time basis, [...]

Read More

This might sound like fancy jargon but doesn’t have to be and is important in enabling your security team to deliver security outcomes to your organisation [...]

Read More

The mercurial world of IT security likes to keep organisations on their toes. The arms race of attackers, countermeasures, vulnerabilities, and cutting-edge [...]

Read More

Like many organisations, some universities are struggling to deliver information security (InfoSec) effectively. What differentiates universities is the [...]

Read More

According to recent Symantec commissioned research of over 3,000 senior security professionals, 82% of people in these roles feel burnt out and two thirds [...]

Read More

Download your FREE eBook HERE

Read More

As a start-up founder you must have asked these questions “Is there a big enough market out there for my idea?” and “how can I make this happen before we [...]

Read More

Find out more about pause and resume technologies in your call centre and how they do not make your business fully PCI compliant.

Read More

Do you feel lost and wonder where to start with information security amidst a storm of demanding students, maverick academics, eroding perimeters and legacy [...]

Read More

What is the Digital Marketplace?

Read More

Read More

Canaries are high confidence triggers that showed miners when the air was unsafe, and when the miners needed to take action. In the digital world, [...]

Read More

Read More

A brief run through of the complexity driven by multiple channels, for valuable data to enter your infrastructure, and how the 6 goals and 12 requirements [...]

Read More

Read More

Read More

Hear from Russell Chopping, our lead consultant for the Savanti Payments Practice, as he describes the three main areas of focus for Savanti when [...]

Read More

Have you ever wondered about the security of the applications you are using, building or considering purchasing for company use? You are not alone in this [...]

Read More

Read More

Read More

Read More

What is slightly disconcerting is that my kids will only ever have a vague memory of going into a bank, and that memory will clearly not include the concept [...]

Read More

As the ‘Start-up’ team you are in that enviable position of having no legacy technology baggage. It is merely a case of defining what it is you want [...]

Read More

If I'm asked the same question by different people at least 3 times in the space of a week, then it has got to be of use to someone if I write some words on [...]

Read More