Build or upgrade your ISMS on our platform

Julia Heron

Sort by:

How to develop an asset inventory for ISO 27001

When we talk about information assets we find that most people think about things like laptops and servers. But there are many other items you’ll need to consider. People, intellectual property and even intangible assets like your organisation’s brand can all fit into your Asset Inventory.

Keep reading >

4 Key Benefits of ISO 27001 Implementation

Compliance with ISO 27001 was previously about having a competitive edge, but as ISO 27001 certification becomes the norm for best-practice information security, it’s increasingly a minimum entry to a tender or contract renewal. Conformity to the standard can make the difference between winning and losing those all important tenders.

Keep reading >

We have been selected as one of the UK’s leading Cyber scaleups

Alliantist is delighted to announce it has been chosen as one of just 20 exclusive businesses from across the UK to be part of Tech Nation Cyber.  It is the UK’s first national cyber security growth programme.  Alumni for other Tech Nation programmes include many household brands.

Keep reading >

Planning the business case for an ISMS – Whitepaper

Are you thinking about implementing an Information Security Management System or wanting to elevate your existing one? Or maybe you’re looking at ISO 27001 certification for your organisation.

Keep reading >

ISO 27001:2013 and ISO 27001:2017 what’s the difference?

In practical terms, very little has changed between the 2013 and 2017 ISO 27001 standards except for a few minor cosmetic points and a small name change.

Keep reading >

The NIST Cybersecurity Framework gets a reboot with Version 1.1

The NIST Cybersecurity Framework is the US standard regulated by the National Institute is Standards and Technology. The original version set out in February 2014 has now been updated to Version 1.1. Let’s take a look at what’s changed.

Keep reading >

Join ISMS.online and Advice Cloud in a live webinar discussing G-Cloud 10

With the long-awaited G-Cloud 10 opening up applications on Wednesday 17th April, we have joined up with partner Advice Cloud to deliver a live ‘what you need to know’ webinar. Thursday 18th April 10-11am GMT G-Cloud 10 is expected to reintroduce cyber security to the framework and we will discuss what that will mean for … Continued

Keep reading >

The National Cyber Security Centre’s ‘Cyber Threat to UK Business’ report is published

What is covered in the cyber threat report? Ransomware and distributed denial of service attacks (DNS) Data breaches and legislation Supply chain compromises Fake news and information operations CEO/business email compromise fraud Major security vulnerabilities Financial sector compromise Targeting of parliament Cyber crime as a service Cryptojacking Increased use of worms Internet of Things Cloud security … Continued

Keep reading >

International Women’s Day 2018: The women working in cyber, infosec, data protection & tech

To celebrate the 2018 International Women’s Day, we asked a number of women from the infosec, cyber and data protection sectors one question: What’s the best thing about working in your particular industry? Here’s what they had to say…

Keep reading >

The ISO 27001:2013 Internal Audit: Simplified

A question often asked by people that are new to information security is “how do I complete an internal audit of my ISMS?”. We thought it would be useful to share some of our guidance and ideas on how you can take a pragmatic business-led approach to achieve your goal.

Keep reading >