Request a Demo

Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.

The Noggin Platform

The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.

Learn More
Resilience Management Buyers Guide - Thumbnail
A Resilience Management Software Buyer's Guide
Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More
  • Home
  • security management

security management

Latest Articles

4 Digital Capabilities to Consider in Business Continuity Planning Software

Companies confronting an unprecedented era of compounding, consecutive, and concurrent crises.

The question then turns to, what business continuity...

Read Article

Mandatory Cyberattack Reporting: A Harbinger of the Future?

As cyberattacks increase will regulators demand mandatory cyberattack reporting?

In one sector, they likely will.

Which one? Read on to find out.

Read Article

What is Crisis Communication? Crisis Communication Strategies

When crisis response goes awry, poor communication is often at fault. Poor communication typically takes any of the following forms:

  • Withholding...
Read Article

5 Reasons to Upgrade Your Emergency Management Platform

Organizations today face a litany of challenges to resilience, with the popularity of the hybrid workforce fragmenting incident response, as well....

Read Article

Operational Risk Management: Overview & Guide

What’s one of the most significant risks businesses face today? That would be operational risk.

Don’t think so? Consider the fates of Enron,...

Read Article

The Benefits of Operational Risk Management

Everyone knows that running a business involves risk. But not all risks are created equal.

Business leaders will encounter certain risks that are...

Read Article

6 Types of Workplace Hazards

Workplace injuries and illnesses don’t come out of the blue. They’re often the product of workplace hazards that haven’t been successfully...

Read Article

BCM Lifecyle: 6 Stages of the Business Continuity Lifecycle

In the age of constant crisis, companies understand the importance of business continuity in continuing the delivery of products or services...

Read Article

What Clients Should Know about Effective Governance of Operational Resilience (OpRes)

Interest in operational resilience has no doubt boomed among your clients, whether they’re in a heavily regulated industry or not. But an OpRes...

Read Article

Strategies to Protect Critical Infrastructure in Times of Heightened Threat

Attacks on critical infrastructure assets are on the rise. And now, national publics are concerned. A staggering 81% of U.S. residents are worried...

Read Article

6 Ways Business Continuity Management Software Can Prepare Your Organization for Any Disruption

Nowadays, disruption is a matter of when not if.

Read Article

Six Key Benefits of Security Management Software

Looking to manage security operations processes in a digital platform? Then, you’re looking for security management software, which covers a variety...

Read Article

Global Cyber Attacks Are Here: What to do?

If you thought major ransomware attacks were a thing of the past, after the Colonial Pipeline hit - think again. A sprawling, global cyber attack...

Read Article

The Three Key Threats to Corporate Security This Year

In today's business landscape security threats are increasing in number, intensity, and frequency for all organizations. But what are the top three...

Read Article

What is Cyber Resilience, and Why is it Important?

We hear so much about resiliency these days because of the cyber threat. According to Accenture, 68 percent of business leaders feel their...

Read Article

How Volatility in the Job Market Exacerbates the Insider Threat Risk

The post-COVID jobs market has been turbulent – and then some. And analysts have looked at this turbulence, most recently demonstrated by mass...

Read Article

ISO 27001 Has Changed: What’s new?

The international information security management system (ISMS) standard ISO/IEC 27001 was originally published in 2012. And much has changed in...

Read Article

What to Do about Increasing Cyber Compliance Risk

Ransomware as a service (RaaS) has become increasingly popular. The practice lets the malware author scale earnings while off-loading personal risk...

Read Article

Tips for Protecting Critical Infrastructure Assets

Lawmakers have spent the last few years ramping up protections for critical infrastructure assets. Many of those, though, predate the COVID surge....

Read Article

Integrating Security and Work Safety

Corporate Security doesn’t exist in a vacuum. Even the best-trained and equipped programs are only as good as the teams working around them. That’s...

Read Article

Lessons Learned from the Optus Data Breach

Maybe you heard, but Optus, one of Australia’s largest telecoms, was recently the target of a massive data breach. The personal data of about 10...

Read Article

Why the Rising Number of Data Alerts Isn’t a Good Thing

Knowledge is power. But too much knowledge can be debilitating. And security practitioners have been sounding the alarm that too many data alerts...

Read Article

Ransomware Attacks on the Rise: What can you do

Ransomware attacks have been around for some time. Nowadays, though, the set of malware attacks that threaten to publish a victim’s personal data or...

Read Article
1 2 3 4
Request a Demo of Noggin