Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Tag: information security

News and information from the Advent IM team.

BLOG: The Significance of Governance, Risk, and Compliance (GRC) in Ensuring Information Security

  • by Olivia Lawlor-Blackburn
  • General

Information security plays a crucial role in the domains of Governance, Risk, and Compliance (GRC). Let’s break down its place and significance in each of these areas: Governance Strategic Alignment: Information Security Policies: Establishing and enforcing security policies that align with organisational objectives. Leadership Involvement: Ensuring that information security is a board-level concern, with active […]

Read More

NEW PODCAST – Secure by Design (SbD): Risk & Resilience ft. Kingston Technology

  • by Olivia Lawlor-Blackburn
  • General

RISK AND BUSINESS: Secure by Design (SbD): Risk & Resilience Secure by Design (SbD) is a methodology that is increasingly being adopted across industries including Police, Government and MOD. Secure by Design (SbD) as an approach, is the requirement in systems and application engineering where security is considered a fundamental aspect of the design process rather […]

Read More

Retirement Reflections from Derek Willins

This is a bittersweet week for us at Advent IM as our own Head of Client Development, Derek Willins, retires. There can be no doubt of his contribution to Advent IM and to security and we will miss his insight, curiosity and collegiate approach that so exemplifies our core values. Derek kindly wrote a post […]

Read More

Recent Retail IT Outages or The Importance of Being Resilient

A post from our MD, Mike Gillespie, on the recent outage impacts and lessons in resilience IT-based outages affecting McDonald’s, Sainsbury’s and Tesco were widely reported last weekend (15th and 16th March 2024), with many confused and angry customers taking to social media to warn others or make contact with the brands, seeking more information. […]

Read More

BLOG: Policing and The Need for Information Management

  • by Olivia Lawlor-Blackburn
  • General

I write this as someone with first-hand experience in information security and its management and also experience in Policing, having served part of my career as a frontline Police Constable; this combination allows me to clearly observe the lack of information management within policing. In 2007, the movie Hot Fuzz starring Simon Pegg and Nick […]

Read More

Successfully Navigating the Complex Waters of Supply Chain Information Security Risk Management

In today’s interconnected and digitally driven business landscape, supply chain and third-party information security risk management have become critical components of a company’s overall cybersecurity strategy. As organisations continue to expand their networks and rely on external partners for various services, the potential vulnerabilities also increase. This is where the expertise of independent consultants can […]

Read More

Zero-click exploits; what you need to know

The Silent Threat: Unveiling the Menace of Zero-Click Malware New cyber security threats emerge with alarming regularity. One such stealthy adversary that has gained prominence in recent times is zero-click malware. Unlike traditional malware that requires user interaction, zero-click malware operates silently, exploiting vulnerabilities without any action from the user. In this blog post, we […]

Read More

2023 Achievements Unveiled: A Recap of Awards and Recognition

  • by Olivia Lawlor-Blackburn
  • General

What a year it has been! At the start of 2023, we celebrated our 20th birthday. When we reflect on the last 20 years, we wonder at how significantly the world has changed since we were a small start-up in an Enterprise Centre. Cyber has entered the mainstream; no longer a niche, the reserve of […]

Read More