The Security Knowledge Centre and Blog

This blog explores the latest and most impactful trends in the Cyber Security industry that are shaping the future of businesses.

Blog Image

February 11, 2026

Do we need an AI policy for ISO 27001?

Do you need an AI policy for ISO 27001? Not necessarily. Learn why ISO 27001 is about risk management, not documents, and how to assess AI within your ISMS properly.

Read More
Kris Long
Blog Image

August 6, 2025

Why Are You Really Implementing That Annex A Control?

Not all ISO 27001 controls add real security value—and a legal register is a prime example. This blog challenges the habit of ticking boxes for compliance and encourages a more strategic, security-focused approach to Annex A. Want to share your take? Connect with Kris on LinkedIn.

Read More
Blog Image

August 1, 2025

Risk Management: The Heart of ISO 27001

Risk management is at the heart of ISO 27001. This blog explains why it's essential, how to identify and treat risks effectively, and how a structured approach helps protect your business, ensure compliance, and build long-term resilience.

Read More
Blog Image

August 6, 2025

What is DKIM?

DKIM is an email authentication protocol that acts like a digital signature, proving your emails are genuine and haven’t been tampered with. This blog explains how DKIM works, why it matters, and how it helps protect your domain from spoofing, phishing, and email fraud.

Read More
Blog Image

August 6, 2025

What is DMARC?

DMARC is an email authentication protocol that protects your domain from spoofing and phishing. This blog explains how it works, why it matters, and how to implement it to secure your email traffic.

Read More