Latest News
Stay up to date with the latest posts and updates about TSA, governance, cyber security and more!
Helping you is What we do !
Here’s what else we’ve been saying, get the latest exclusive insights delivered straight to your inbox.
[{"id":421,"link":"https:\/\/www.business-secure.com\/making-sure-you-dont-cop-a-packet-managing-third-party-admins-in-the-tsa\/","name":"making-sure-you-dont-cop-a-packet-managing-third-party-admins-in-the-tsa","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2025\/04\/AdobeStock_1038222678-scaled.jpeg?fit=2560%2C1435&ssl=1","alt":""},"title":"Making sure you don't CoP a packet - Managing third-party admins in the TSA","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 15:06:38","modifiedDate":"2025-04-25 15:13:51","modifiedDateGMT":"2025-04-25 15:13:51","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cloud\/' rel='post_tag'>Cloud<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":9,"sec":29},"status":"publish","excerpt":""},{"id":354,"link":"https:\/\/www.business-secure.com\/what-the-cop-is-the-cloud-forecast-clear-for-tsa\/","name":"what-the-cop-is-the-cloud-forecast-clear-for-tsa","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/08\/AdobeStock_758244159-scaled.jpeg?fit=2560%2C1019&ssl=1","alt":""},"title":"What the CoP - Is the Cloud forecast clear for TSA?","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Aug 13, 2024","dateGMT":"2024-08-13 09:47:37","modifiedDate":"2025-01-30 09:49:19","modifiedDateGMT":"2025-01-30 09:49:19","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/cyber\/\" rel=\"category tag\">Cyber<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/resiience\/\" rel=\"category tag\">Resilience<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/cyber\/\" rel=\"category tag\">Cyber<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/resiience\/\" rel=\"category tag\">Resilience<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cloud\/' rel='post_tag'>Cloud<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":13,"sec":12},"status":"publish","excerpt":""},{"id":348,"link":"https:\/\/www.business-secure.com\/are-your-consultants-helping-you-on-your-tsa-journey\/","name":"are-your-consultants-helping-you-on-your-tsa-journey","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/06\/WhatsApp-Image-2024-02-23-at-13.34.48.jpeg?fit=460%2C276&ssl=1","alt":""},"title":"Are your consultants helping you on your TSA journey?","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Jun 17, 2024","dateGMT":"2024-06-17 12:33:10","modifiedDate":"2025-01-16 09:47:09","modifiedDateGMT":"2025-01-16 09:47:09","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cloud\/' rel='post_tag'>Cloud<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":4,"sec":5},"status":"publish","excerpt":""},{"id":308,"link":"https:\/\/www.business-secure.com\/what-the-cop-are-you-missing-key-supply-chain-measures\/","name":"what-the-cop-are-you-missing-key-supply-chain-measures","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2023\/12\/AdobeStock_245873693-scaled.jpeg?fit=2560%2C1362&ssl=1","alt":""},"title":"What the CoP - are you missing key supply chain measures?","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Feb 7, 2024","dateGMT":"2024-02-07 16:49:07","modifiedDate":"2024-06-12 16:08:24","modifiedDateGMT":"2024-06-12 16:08:24","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/cyber\/\" rel=\"category tag\">Cyber<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/cyber\/\" rel=\"category tag\">Cyber<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cloud\/' rel='post_tag'>Cloud<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":6,"sec":19},"status":"publish","excerpt":""},{"id":280,"link":"https:\/\/www.business-secure.com\/learning-from-the-past-have-we-been-successful-in-changing-value-perception\/","name":"learning-from-the-past-have-we-been-successful-in-changing-value-perception","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/01\/AdobeStock_89418231-scaled.jpeg?fit=2560%2C1509&ssl=1","alt":""},"title":"Learning from the past - have we been successful in changing value perception?","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Jan 24, 2024","dateGMT":"2024-01-24 15:23:16","modifiedDate":"2024-02-02 16:19:51","modifiedDateGMT":"2024-02-02 16:19:51","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/cyber\/\" rel=\"category tag\">Cyber<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/cyber\/\" rel=\"category tag\">Cyber<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/valueperception\/' rel='post_tag'>ValuePerception<\/a>"},"readTime":{"min":3,"sec":13},"status":"publish","excerpt":""},{"id":264,"link":"https:\/\/www.business-secure.com\/what-the-cop-understanding-the-status-of-the-tsa-code-of-practice\/","name":"what-the-cop-understanding-the-status-of-the-tsa-code-of-practice","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/01\/AdobeStock_148461895-scaled.jpeg?fit=2560%2C1571&ssl=1","alt":""},"title":"What the CoP? Understanding the status of the TSA code of practice","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Jan 22, 2024","dateGMT":"2024-01-22 15:08:52","modifiedDate":"2024-02-23 14:17:15","modifiedDateGMT":"2024-02-23 14:17:15","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cloud\/' rel='post_tag'>Cloud<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":7,"sec":20},"status":"publish","excerpt":""},{"id":261,"link":"https:\/\/www.business-secure.com\/working-smarter-core-time\/","name":"working-smarter-core-time","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/01\/AdobeStock_428613991-scaled.jpeg?fit=2560%2C1707&ssl=1","alt":""},"title":"Working smarter - Core time","author":{"name":"Matt Villion","link":"https:\/\/www.business-secure.com\/author\/mvillion\/"},"date":"Jan 19, 2024","dateGMT":"2024-01-19 15:01:45","modifiedDate":"2024-01-19 15:01:48","modifiedDateGMT":"2024-01-19 15:01:48","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/gtd-coretime-workingsmarter\/' rel='post_tag'>#GTD #CoreTime #WorkingSmarter<\/a>"},"readTime":{"min":2,"sec":38},"status":"publish","excerpt":""},{"id":222,"link":"https:\/\/www.business-secure.com\/five-things-that-could-be-impacting-your-tsa-programme\/","name":"five-things-that-could-be-impacting-your-tsa-programme","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/01\/AdobeStock_614431506-scaled.jpeg?fit=2560%2C1707&ssl=1","alt":""},"title":"Five things that could be impacting your TSA programme","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Jan 9, 2024","dateGMT":"2024-01-09 12:59:48","modifiedDate":"2024-01-12 13:45:27","modifiedDateGMT":"2024-01-12 13:45:27","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cloud\/' rel='post_tag'>Cloud<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":13,"sec":14},"status":"publish","excerpt":""},{"id":147,"link":"https:\/\/www.business-secure.com\/pam-in-the-tsa-whos-definition-is-it-anyway\/","name":"pam-in-the-tsa-whos-definition-is-it-anyway","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/01\/AdobeStock_42712964-scaled.jpeg?fit=2560%2C1700&ssl=1","alt":""},"title":"PAM in the TSA, who's definition is it anyway?","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Oct 12, 2023","dateGMT":"2023-10-12 10:18:18","modifiedDate":"2024-03-13 09:36:52","modifiedDateGMT":"2024-03-13 09:36:52","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":13,"sec":55},"status":"publish","excerpt":""},{"id":137,"link":"https:\/\/www.business-secure.com\/tsa-governance-matters\/","name":"tsa-governance-matters","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/01\/AdobeStock_139439661-edited-1-scaled.jpeg?fit=2560%2C1707&ssl=1","alt":""},"title":"Governance matters in the TSA","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Jul 14, 2023","dateGMT":"2023-07-14 10:10:58","modifiedDate":"2024-01-09 15:36:36","modifiedDateGMT":"2024-01-09 15:36:36","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":13,"sec":17},"status":"publish","excerpt":""},{"id":59,"link":"https:\/\/www.business-secure.com\/tsa-managing-assets\/","name":"tsa-managing-assets","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2024\/01\/AdobeStock_233021773-edited-scaled.jpeg?fit=2560%2C2560&ssl=1","alt":""},"title":"Managing assets in the TSA","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Jun 30, 2023","dateGMT":"2023-06-30 11:31:37","modifiedDate":"2024-02-22 11:56:24","modifiedDateGMT":"2024-02-22 11:56:24","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/assetmanagement\/' rel='post_tag'>AssetManagement<\/a><a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/pam\/' rel='post_tag'>PAM<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":12,"sec":33},"status":"publish","excerpt":""},{"id":55,"link":"https:\/\/www.business-secure.com\/tsa-addressing-common-myths\/","name":"tsa-addressing-common-myths","thumbnail":{"url":"https:\/\/i0.wp.com\/www.business-secure.com\/wp-content\/uploads\/2023\/06\/1687435420815.jpeg?fit=1080%2C720&ssl=1","alt":""},"title":"Addressing the myths in the TSA","author":{"name":"Des Ward","link":"https:\/\/www.business-secure.com\/author\/desward\/"},"date":"Jun 23, 2023","dateGMT":"2023-06-23 11:22:29","modifiedDate":"2024-01-09 15:40:10","modifiedDateGMT":"2024-01-09 15:40:10","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a>, <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>","space":"<a href=\"https:\/\/www.business-secure.com\/category\/governance\/\" rel=\"category tag\">Governance<\/a> <a href=\"https:\/\/www.business-secure.com\/category\/governance\/telecomms\/\" rel=\"category tag\">Telecomms<\/a>"},"taxonomies":{"post_tag":"<a href='https:\/\/www.business-secure.com\/tag\/beyondcyber\/' rel='post_tag'>BeyondCyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/compliance\/' rel='post_tag'>Compliance<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyber\/' rel='post_tag'>Cyber<\/a><a href='https:\/\/www.business-secure.com\/tag\/cyberrisk\/' rel='post_tag'>CyberRisk<\/a><a href='https:\/\/www.business-secure.com\/tag\/governance\/' rel='post_tag'>Governance<\/a><a href='https:\/\/www.business-secure.com\/tag\/governancematters\/' rel='post_tag'>GovernanceMatters<\/a><a href='https:\/\/www.business-secure.com\/tag\/hscn\/' rel='post_tag'>HSCN<\/a><a href='https:\/\/www.business-secure.com\/tag\/infosec\/' rel='post_tag'>InfoSec<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecoms\/' rel='post_tag'>Telecoms<\/a><a href='https:\/\/www.business-secure.com\/tag\/telecomssecurity\/' rel='post_tag'>TelecomsSecurity<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsa\/' rel='post_tag'>TSA<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsf\/' rel='post_tag'>TSF<\/a><a href='https:\/\/www.business-secure.com\/tag\/tsr\/' rel='post_tag'>TSR<\/a>"},"readTime":{"min":7,"sec":33},"status":"publish","excerpt":""}]