Skip to content
  • SERVICES
    • CYBERSECURITY INCIDENT RESPONSE
    • DISASTER RECOVERY as a SERVICE
    • INFORMATION SECURITY RISK ASSESSMENT
    • MANAGED IT SERVICES
    • MANAGED SECURITY SERVICES
    • OFFICE 365 MIGRATION
    • PROJECT SERVICES
  • SOLUTIONS
    • CLOUD SOLUTIONS
    • ESSENTIAL EIGHT CYBERSECURITY
    • IT GOVERNANCE, RISK & COMPLIANCE
  • CASE STUDIES
  • BLOG
  • TEAM
  • CAREERS
  • CONTACT

IT Cost Optimisation: Part 2 – The Art and Science of Right-Sizing



11 August, 2025 | Brandon Salem

Why Regular Information Security Reviews Are Critical in Biotech and Pharma



4 August, 2025 | Valeriy Naydonov

Using Microsoft Teams? Don’t Assume It’s Safe – Verify



24 July, 2025 | Valeriy Naydonov

Uncovering the Unknown



24 July, 2025 | Valeriy Naydonov

Ingram Micro Outage: A Critical Reminder of Third-Party Risk



7 July, 2025 | Brandon Salem

Unmasking the Invisible: Why True Security Starts with Visibility



20 June, 2025 | Brandon Salem

IT Cost Optimisation: Part 1 – Redundant Software



4 June, 2025 | Brandon Salem

Security Is Not a Checklist – A Deeper Dive



15 May, 2025 | Brandon Salem

CIPP Vulnerability Finding – A Third-Party Risk Story



17 March, 2025 | Brandon Salem

Protecting Biotech and Pharma Companies in the Age of AI: Imperatives and Risks



30 December, 2024 | Dr Irving Hofman
  • 1
  • 2
  • 3
  • …
  • 5
  • Next »

CONNECT
WITH US

CONTACT
IS814198-mark-of-trust-certified-ISOIEC-27001-information-security-management-white-logo-trans-En-GB-1019_180x104

© 2025 Exigence

linkedin
Exigence