ISO 27001:2022 Transition Challenges and How to Use ISO 27002
Practical insight from an ISO 27001 consultant With ISO 27001:2013 certification now unavailable, organisations must transition to the 2022 standard…
Practical insight from an ISO 27001 consultant With ISO 27001:2013 certification now unavailable, organisations must transition to the 2022 standard…
Hackers got access to phone call and text message records belonging to roughly 109 million people in the AT&T data…
The cybersecurity landscape is a battlefield, but the biggest threats don’t always come from external hackers. As a seasoned warrior…
Security researchers observed hackers exploiting a vulnerability only 22 minutes after releasing proof of concept (PoC). It is the case…
If you’re responsible for an organization’s cybersecurity, then the appeal of automated incident response is obvious. Any technology that speeds…
Evolving landscape of LLM Security The emergence of Large Language Models (LLMs) has revolutionized the capabilities of artificial intelligence, offering…
A deep dive into the ICO’s numbers We often hear the terms ‘accidental breach’ and ‘internal threat’, but how common…
As the ransomware threat landscape continues to wreak havoc on industries across the nation, healthcare providers all over the country…
This post is part of a series on privacy-preserving federated learning. The series is a collaboration between NIST and the…
Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified…