APACHE STRUTS 2 Critical Vulnerability – CVE: 2023-50164APACHE STRUTS 2 Critical Vulnerability – CVE: 2023-50164

APACHE STRUTS 2 Critical Vulnerability – CVE: 2023-50164

2 years ago

Risk Rating: CRITICAL CVSS Score: 9.8 Vulnerability Type: Remote Code Execution (RCE) CVE Identifier: CVE-2023-50164 Exploitation Status: Actively exploited. Affected Version:…

How to Establish a Clear Desk & Clear Screen Policy for Your OrganisationHow to Establish a Clear Desk & Clear Screen Policy for Your Organisation

How to Establish a Clear Desk & Clear Screen Policy for Your Organisation

2 years ago

You know that feeling when you walk into an office, and it looks like a hurricane just blew through? Papers…

What is Open-Source Intelligence and How to Get StartedWhat is Open-Source Intelligence and How to Get Started

What is Open-Source Intelligence and How to Get Started

2 years ago

Imagine a world intricately woven with connections, where information flows like a meandering river of possibilities. This is the world…

NIS2 Directive Timeline & Requirements to Minimise RisksNIS2 Directive Timeline & Requirements to Minimise Risks

NIS2 Directive Timeline & Requirements to Minimise Risks

2 years ago

NIS 2 is Changing It’s getting Risky out there... The protection of our networks and systems is of utmost importance,…

How to Get Ready for Your ISO 27001 AuditHow to Get Ready for Your ISO 27001 Audit

How to Get Ready for Your ISO 27001 Audit

2 years ago

In the world of information security, there are many frameworks and countless guidelines. But among them all, one standard rules…

How to File a Data Breach Compensation ClaimHow to File a Data Breach Compensation Claim

How to File a Data Breach Compensation Claim

2 years ago

What is a Data Breach Claim? “Someone stole my personal information and I want something done about it now!”  A…

ISO 27001: Steps to Write a Statement of ApplicabilityISO 27001: Steps to Write a Statement of Applicability

ISO 27001: Steps to Write a Statement of Applicability

2 years ago

ISO 27001 Statement of Applicability A central component of becoming compliant with ISO 27001 is creating a Statement of Applicability…

How to Respond When Data Breaches Hit the FanHow to Respond When Data Breaches Hit the Fan

How to Respond When Data Breaches Hit the Fan

2 years ago

Not many companies anticipate being the focal point of a significant data breach incident. However, cybercriminals can infiltrate around 93%…

Navigating PPI Principals of GDPR for Small BusinessesNavigating PPI Principals of GDPR for Small Businesses

Navigating PPI Principals of GDPR for Small Businesses

2 years ago

“So, all we have to do to implement these 11 chapters containing 91 articles in 261 pages of data protection…