News & press coverage

Turnkey, our experts and our successes have been noted in the following publications.

cw_logo
November 26, 2021Security Think Tank: Secure access service edge (SASE) technology
Read More
cw_logo
September 02, 2021Security Think Tank: Secure data management
Read More
Raconteur-Logo
August 25, 2021Ethical hacking and penetration testing - comment in Raconteur / The Times
Read More
cw_logo
August 23, 2021SIEM and SOAR - insight for buying decisions
Read More
Securityweek
August 03, 2021SAP Security Survey Report 2021 - key findings
Read More
news_logo_helpnetsecurity
August 03, 2021SAP Security Survey Report 2021 - key findings
Read More
E3 Magazine
July 29, 2021SAP Security Survey Report 2021 - key findings
Read More
InformationAge
July 13, 2021How to prepare now for UK SOX - we talk to Information Age
Read More
cw_logo
June 08, 2021Security Think Tank: The security implications of the ‘return to the office'
Read More
Raconteur-Logo
June 21, 2021Covid-19 and employee fraud - comment in Raconteur / The Times
Read More
cw_logo
June 11, 2021Security Think Tank: To secure printers think process, technology and people
Read More
cw_logo
April 14, 2021Security Think Tank: Vaccine passports cannot be taken lightly
Read More
Consulting US logo
March 18, 2021Announcement: Turnkey and LegionStar joint venture
Read More
cw_logo
March 17, 2021Security Think Tank: Take a realistic perspective on CNI cyber attacks
Read More
logo_sig
March 15, 2021Turnkey Consulting highlights SME sector’s key role in tackling climate change
Read More
GRC world forum
February 15, 2021Bridging the gap between business goals and security requirements
Read More
cw_logo
February 15, 2021Security Think Tank: Renewed US stability may ease cyber tensions
Read More
IT Pro
January 25, 2021What are employers' responsibilities when we use personal tech to work from home?
Read More
cw_logo
January 05, 2021Security Think Tank: Cyber effectiveness, efficiency key in 2021
Read More
Computing logo
December 11, 2020Security Excellence Awards - Richard Hunt interview
Read More
it-security-guru-logo
December 09, 2020Why a fear of cyber threats is not paranoia
Read More
cw_logo
December 02, 2020Security Think Tank: SIEM and SOAR are from mutually exclusive
Read More
GBAF-logo
December 01, 2020Bots Are People Too: Robotic Process Automation in Finance
Read More
Computing logo
November 02, 2020Turnkey shortlisted for Risk Management and Security Innovation of the Year at the Security Excellence Awards 2020
Read More
cw_logo
October 19, 2020Security Think Tank: Safeguarding PII in the current threat landscape
Read More
cw_logo
September 15, 2020Security Think Tank: No secret sauce for edge security, just good practice
Read More
UK Authority
September 10, 2020South Central Ambulance Service to automate business processes
Read More
eGyidzUP
September 3, 2020Cybersecurity in the COVID era: Guarding against phishing
Read More
E3 Magazine
August 10, 2020Putting Out Fires: Ensuring Privileged Access Management With SAP Firefighter
Read More
cw_logo
July 13, 2020Security Think Tank: Ignore AI overheads at your peril
Read More
E3 Magazine
July 1, 2020Turnkey Consulting Brings Cybersecurity Expertise To France
Read More
cw_logo
June 24, 2020Security Think Tank: Securing containers needn’t be taxing
Read More
cw_logo
May 13, 2020Security Think Tank: Burnt out CISOs are a huge cyber risk
Read More
cw_logo
May 4, 2020SAP S/4 Hana projects seem set to repeat security missteps
Read More
cw_logo
April 3, 2020Security Think Tank: Continuity planning doesn’t have to be complex
Read More
Dark Reading logo
March 26, 2020Security Not a Priority for SAP Projects, Users Report
Read More
Screen Shot 2020-04-03 at 17.45.49
March 26, 2020PrivSec Report: #Privacy: 69% of SAP users believe SAP projects do not prioritise IT security
Read More
SCMediaUK
February 17, 2020The feral app threat: Lack of visibility worsens threat for enterprises
Read More
cw_logo
February 17, 2020Security Think Tank: Ask yourself if zero trust is right for you
Read More
cw_logo
January 6, 2020Security Think Tank: Let’s call time on inciting fear among users
Read More
prolific_london_logo
December 11, 2019Turnkey Consulting appoints former PwC partner as first Chairman
Read More
cw_logo
December 11, 2019Security Think Tank: Risk-based response critical to protect data
Read More
cw_logo
November 5, 2019Security Think Tank: The cloud needs security by design
Read More
cw_logo
November 4, 2019Making the case for integrated risk management
Read More
cw_logo
October 15, 2019Security Think Tank: Risk management must go beyond spreadsheets
Read More
cw_logo
October 9, 2019Security Think Tank: The operational approach to integrated risk management
Read More
E3 Magazine
October 9, 2019How SAP GRC Can Accelerate Integrated Risk Managemen
Read More
E3 Magazine
September 25, 2019Avoiding Security Remediation In S/4 Hana Projects
Read More
cw_logo
September 10, 2019Security Think Tank: The case for blockchain-based identity
Read More
E3 Magazine
August 27, 2019SAP Access Management: Beyond The Application Layer
Read More
cw_logo
August 12, 2019Security Think Tank: Balancing data accessibility with security controls
Read More
cw_logo
July 12, 2019Security Think Tank: Don’t dismiss the business benefits of GDPR
Read More
E3 Magazine
June 19, 2019Security Risks of Increased Mobility With S/4 Hana
Read More
cw_logo
June 11, 2019Security Think Tank: Frame cyber security impacts in business contexts
Read More
cw_logo
May 21, 2019Security Think Tank: In-app segregation more intelligent and permissive
Read More
E3 Magazine
May 7, 2019What Systems Integrators Don’t Explain About S/4 Hana
Read More
isbuzz-news-logo
April 17, 2019Wipro breach: a call for ever-rigorous cyber security protection say Richard Hunt, managing director at Turnkey Consulting
Read More
cw_logo
April 16, 2019Security Think Tank: Seven steps to manage risk of catastrophic cyber attack
Read More
cw_logo
March 12, 2019Security Think Tank: No one key risk indicator is generic across all businesses
Read More
cw_logo
February 11, 2019Security Think Tank: Know strengths and weaknesses of UTM systems
Read More
ID Bulletin logo
January 25, 2019ID Bulletin Expert Panel: Can MFA work long term if customers prefer convenience over security?
Read More
Director logo
January 17, 2019Director Magazine Case Study: how I set up in Australia
Read More
cw_logo
January 7, 2019Security Think Tank: Use SDN, containerisation and encryption tools to boost security
Read More
cw_logo
December 31, 2018Security Think Tank: Pay attention to attribute-based system access permissions
Read More
cw_logo
December 13, 2018Security Think Tank: Prevention and detection key to disrupting malware comms
Read More
cw_logo
November 2, 2018Security Think Tank: Deploy multiple defence layers to protect data-rich applications
Read More
E3 Magazine
October 29, 2019Are You Able To Detect Your (Cloud) Access Threats?
Read More
E3 Magazine
October 15, 2018SAP Identity Management: Automated access reduces risk
Read More
cw_logo
October 4, 2018Security Think Tank: Shift to outcomes-based security based by focusing on business needs
Read More
cw_logo
September 13, 2018Security Think Tank: Adopt a proactive approach to software vulnerabilities
Read More
cw_logo
August 15, 2018Security Think Tank: Outsource Security Operations, Not Control
Read More
cw_logo
July 06, 2018Security Think Tank: How To Create Good Passwords And Add Security Layers
Read More
cw_logo
June 01, 2018Security Think Tank: Understand Data For Risk-Based Protection
Read More
cw_logo
May 01, 2018Security Think Tank: Reducing Cyber Attacker Dwell Time Is Critical
Read More
image-1
April 25, 2018GDPR Report: The Role Of The Board In Sustainable GDPR Compliance
Read More
cw_logo
April 24, 2018Security Think Thank: Use Good Practice To Address Cryptojacking Risk
Read More
cw_logo
March 13, 2018Security Think Thank: Multi-Layered Security Key To Fileless Malware Defence
Read More
verdict_encrypt-362453-edited
March 13, 2018What CyberSecurity Risks Are Companies Currently Underestimating Most?
Read More
E-3_logo-300x86
February 1, 2018SAP Skills: Why Contractor Hire Is Not The Only Option
Read More
cw_logo
January 31, 2018Security Think Thank: Don't Automatically Automate Security
Read More
E-3_logo-300x86
December 5, 2017UKISUG Connect: GDPR, Business Transformation And Robot Risk
Read More
E-3_logo-300x86
November 21, 2017Turnkey's Celebration of 10 Years in Australia, Features In 'e-3 Magazine International'
Read More
ISAP_Logo220x90
November 21, 2017Turnkey's Expansion To New Zealand Features In 'Insidesap' Magazine
Read More
cw_logo
November 8, 2017Security Think Tank: Web Security Down To Good Risk Management
Read More
cw_logo
October 5, 2017Security Think Tank: Security Analytics May Not Be For Everyone
Read More
cw_logo
September 20, 2017Security Think Tank: Six Ways To Boost Cyber Resilience
Read More
cw_logo
Aug 9, 2017Security Think Tank: Five Security Controls To Keep Employees Out Of Cyber Firing Line
Read More
Defence Digital
May 10, 2017Cyber Security & The Sap Estate: Practical Steps For Every Organisation
Read More
cw_logo
Apr 30, 2017Security Think Tank: How To Maximise The Value Of Red Team Excercises
Read More
cw_logo
Apr 25, 2017Tips On How To Get a Hana Implementation Off The Ground
Read More
logo-NatWest
Apr 21, 2017Turning Disaster Into Opportunity
Read More
logo-ScienceDirect
Mar 30, 2017The Uk's £1.9bn Cyber-Security Spend – Getting The Priorities Right (Please Note, Full Article Is Paid-For Content)
Read More
cw_logo
Mar 29, 2017Security Think Tank: Four Guidelines On How Balance Security, Usability And Cost
Read More
cw_logo
Feb 20, 2017Security Think Tank: Data Custodians Likely To Be Top Targets Of Integrity Attacks
Read More
cbrlogo
Jan 18, 2017How a Cloud-Based Philosophy Makes Traditional Consultancy Services Easier To Purchase
Read More
cw_logo
jan 16, 2017Security Think Tank: Add Risk Of Dns Attack To Business Continuity Plan
Read More
cw_logo
Jan 10, 2017How Information Security Professionals Can Help Business Understand Cyber Risk
Read More
idglogo
Jan 5, 2017What Will Be The Single Biggest Security Threat Of 2017?
Read More
cw_logo
Dec 7, 2016Security Think Tank: Cyber Insurance – How To Make Cyber Risk Easier For Business To Understand
Read More
cw_logo
Oct 10, 2016Security Think Tank: Cyber Insurance – Factor In All Costs And Obligations
Read More
cw_logo
Oct 10, 2016Security Think Tank: Phishing: Protect, Educate And Limit Damage
Read More
ITProPortal
Sep 14, 2016Enterprise Risk Management: 'Management-Speak' Or Critical Business Tool?
Read More
cw_logo
Sep 2, 2016Security Think Tank: Addressing The Malware Arms Race
Read More
cw_logo
Aug 3, 2016Security Think Tank: Brexit And Infosec - For Now It's Business As Usual
Read More
sc-magazine
July 25, 2016Bugs In Sap Hana Allowed Remote Code Execution
Read More
cw_logo
July 09, 2016Security Think Tank: Biometrics Have Key Role In Multi-Factor Security
Read More
cw_logo
june 09, 2016Security Think Tank: How Info Sec Pros Should Influence Prep For GDPR
Read More
gc-header-logo_1
March 29, 2016GRC Is The Facilitator
Read More
Info_Security
February 23, 2015How To 'Protect The Data Inside The Data Center'
Read More
computing_software_logo
December 07, 2015Getting GRC Right - Turnkey Consulting Talks To Computing Security Magazine
Read More
logo
November 30, 2015Turning Data Privacy Controls Projects Into Business Benefit
Read More
Forrester-Logo.svg
February 26, 2015Forrester Research Report: Defining Data Protection
Read More
techweeklogo
December 19, 2015What Should Chief Security Officers Ask Santa For This Christmas?
Read More
m
March 3, 2015Turnkey Consulting Achieves Sap Recognized Expertise Status For GRC
Read More
1
December 6, 2015Turnkey Consulting Shares Expertise At Sap GRC 2015
Read More
1
August 28, 2015Presentations And New Product At Sap Insider Singapore Conference
Read More
news-item
January 8, 2015Turnkey Consulting Opens Office In Singapore
Read More
cw_logo
Nov 11-13, 2018Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium

Identity and access management is the security discipline that enables the right

Read More