Request a Demo

Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.

The Noggin Platform

The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.

Learn More
Resilience Management Buyers Guide - Thumbnail
A Resilience Management Software Buyer's Guide
Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More
  • Home
  • security management

security management

Latest Articles

Choosing the Best Business Continuity Planning Software for Universities: A 2026 guide

The delivery of high-quality academic programs is central to the mission of any higher education institution. But when it comes to business and...

Read Article

Higher Education Cybersecurity 2026: A Guide to institutional resilience for university leaders

Beyond ransomware: Data extortion and stealth attacks in higher ed

According to research, the education sector remained the most targeted industry...

Read Article

DORA 2026 Guide: The Digital Operational Resilience Act Supervisory Guide

Navigating the March 31 transmission deadline and new supervisory cycle

March 31 represents the hard deadline for National Competent Authorities...

Read Article

Workplace Violence Prevention Guide: 2026 strategy and compliance

The reality of the risk landscape

When an incident of workplace violence occurs, the effects are pervasive. For workers, the trauma ranges from...

Read Article

Building a Resilient Supply Chain: Strategies, frameworks & technologies for 2026

The 2020s have officially retired the era of the just-in-time supply chain. Between global tariff shifts and escalating climate volatility,...

Read Article

How Retailers Can Improve Their Security Operations Centers (SOCs)

In 2026, retail is facing a perfect storm. Digital footprints have expanded. And the threat landscape has followed suit. Now, one in three consumers...

Read Article

5 Strategies to Improve Crisis Communication: Enhancing organizational resilience

When a crisis strikes, effective response depends on deft information handling. In a high-stakes environment, your communication channels become a...

Read Article

Third-Party Risk Management Software vs. Spreadsheets: A cost comparison

The third-party risk landscape in 2026

With cyber risk increasing, security teams have had to work harder to secure their home networks. Little did...

Read Article

Rolling Out Business Continuity Management Software For Enterprise Organizations

Enterprise organizations are typically large, complex, and highly structured, composed of thousands of team members running multifaceted operations...

Read Article

Challenges to Achieving Situational Awareness in Incident Management

In the chaos of an incident, nothing counts more than situational awareness, the shared, real-time understanding needed to protect people and...

Read Article

4 Benefits of AI-powered SOCs

Going into 2026, organizations are experiencing a deluge of security alerts, which are short-circuiting their traditional tools and processes.

The...

Read Article

The Importance of Physical Security Information Management (PSIM)

In physical security management, we’ve traditionally built security apps and devices to respond to specific threats. What happens, though, when...

Read Article

Physical Security Information Management (PSIM) Explained

When polled in 2022, most organizations reported seeing a steady or increasing level of physical security incidents. In this article, we discuss how...

Read Article

What Is Threat Intelligence?

Ransomware is in the news. However, backdoors are actually the most common adversary action, according to the 2023 IBM-sponsored Threat Intelligence...

Read Article

Six Stages of the Threat Intelligence Lifecycle

As the cyber threat intensifies, businesses have become ever more reliant on threat intelligence, or threat information that’s been aggregated,...

Read Article

Six Key Benefits of Security Management Software

Looking to manage security operations processes in a digital platform? Then, you’re looking for security management software, which covers a variety...

Read Article

Global Cyber Attacks Are Here: What to do?

If you thought major ransomware attacks were a thing of the past, after the Colonial Pipeline hit - think again. A sprawling, global cyber attack...

Read Article

The Three Key Threats to Corporate Security This Year

In today's business landscape security threats are increasing in number, intensity, and frequency for all organizations. But what are the top three...

Read Article

What is Cyber Resilience, and Why is it Important?

We hear so much about resiliency these days because of the cyber threat. According to Accenture, 68 percent of business leaders feel their...

Read Article

How Volatility in the Job Market Exacerbates the Insider Threat Risk

The post-COVID jobs market has been turbulent – and then some. And analysts have looked at this turbulence, most recently demonstrated by mass...

Read Article

ISO 27001 Has Changed: What’s new?

The international information security management system (ISMS) standard ISO/IEC 27001 was originally published in 2012. And much has changed in...

Read Article

What to Do about Increasing Cyber Compliance Risk

Ransomware as a service (RaaS) has become increasingly popular. The practice lets the malware author scale earnings while off-loading personal risk...

Read Article

Tips for Protecting Critical Infrastructure Assets

Lawmakers have spent the last few years ramping up protections for critical infrastructure assets. Many of those, though, predate the COVID surge....

Read Article
1 ...
2 3 4 5 6
Request a Demo of Noggin