ISO 27001 Checklist: 9-step Implementation Guide
We’re not going to lie: implementing an ISO 27001-compliant ISMS (information security management system) can be a challenge But as…
We’re not going to lie: implementing an ISO 27001-compliant ISMS (information security management system) can be a challenge But as…
Security programmes often look great on paper. But, post implementation, have you confirmed that: You’ve chosen the right measures? You’ve…
Business impact analysis, or ‘BIA’, is a process usually associated with business continuity and operational resilience – areas that have…
Christmas is the time where we allow our imaginations to run wild, it’s the season of goodwill, high spirits and…
The GDPR (General Data Protection Regulation) outlines six conditions under which organisations can process personal data. Four of those conditions…
Phishing is one of the greatest cyber security threats that organisations face. Attacks are increasingly popular because they’re easy to…
Want to improve your data security but can’t decide between ISO 27001 and SOC 2? You’re in a familiar position.…
The EU GDPR (General Data Protection Regulation) places many obligations on organisations that process personal data – which is pretty…
The EU GDPR (General Data Protection Regulation) places many obligations on organisations that process personal data – which is pretty…
Using artificial intelligence in operational technology environments could be a bumpy ride full of trust issues and security challenges.