Safely move on from COVID-19

Julia Heron

Sort by:

How to develop an Asset Inventory for ISO 27001 – A pragmatic approach

Introducing Asset Inventory  You have to create an inventory of your organisation’s information assets to: Build an effective Information Security Management System (ISMS) Achieve ISO 27001 compliance or certification… Keep reading >

4 Key Benefits of ISO 27001 Implementation

4 key benefits of ISO 27001 implementation ISO 27001:2013 (the current version of ISO 27001) is one of the most popular information security standards in the world. More and more… Keep reading >

The ISO 27001:2013 Statement of Applicability (SoA): The Complete Guide

The Statement of Applicability (SoA) forms a fundamental part of your information security management system (ISMS) and, together with the Scope, as described in 4.3 of ISO 27001:2013, will offer… Keep reading >

We have been selected as one of the UK’s leading Cyber scaleups

Alliantist is delighted to announce it has been chosen as one of just 20 exclusive businesses from across the UK to be part of Tech Nation Cyber.  It is the… Keep reading >

Planning the business case for an ISMS – Whitepaper

Are you thinking about implementing an Information Security Management System or wanting to elevate your existing one? Or maybe you’re looking at ISO 27001 certification for your organisation. Alliantist CEO,… Keep reading >

ISO 27001:2013 and ISO 27001:2017 what’s the difference?

The difference in ISO 27001 versions In practical terms, very little has changed between the 2013 and 2017 ISO 27001 standards except for a few minor cosmetic points and a… Keep reading >

The NIST Cybersecurity Framework gets a reboot with Version 1.1

The NIST Cybersecurity Framework is the US standard regulated by the National Institute is Standards and Technology. The original version set out in February 2014 has now been updated to… Keep reading >

Join and Advice Cloud in a live webinar discussing G-Cloud 10

With the long-awaited G-Cloud 10 opening up applications on Wednesday 17th April, we have joined up with partner Advice Cloud to deliver a live ‘what you need to know’ webinar.… Keep reading >

The National Cyber Security Centre’s ‘Cyber Threat to UK Business’ report is published

What is covered in the cyber threat report? Ransomware and distributed denial of service attacks (DNS) Data breaches and legislation Supply chain compromises Fake news and information operations CEO/business email compromise… Keep reading >

International Women’s Day 2018: The women working in cyber, infosec, data protection & tech

  To celebrate the 2018 International Women’s Day, we asked a number of women from the infosec, cyber and data protection sectors one question: What’s the best thing about working… Keep reading >