
APACHE STRUTS 2 Critical Vulnerability – CVE: 2023-50164
Risk Rating: CRITICAL CVSS Score: 9.8 Vulnerability Type: Remote Code Execution (RCE) CVE Identifier: CVE-2023-50164 Exploitation [...]
How to Establish a Clear Desk & Clear Screen Policy for Your Organisation
You know that feeling when you walk into an office, and it looks like a [...]
What is Open-Source Intelligence and How to Get Started
Imagine a world intricately woven with connections, where information flows like a meandering river of [...]
NIS2 Directive Timeline & Requirements to Minimise Risks
NIS 2 is Changing It’s getting Risky out there… The protection of our networks and [...]
How to Get Ready for Your ISO 27001 Audit
In the world of information security, there are many frameworks and countless guidelines. But among [...]
How to File a Data Breach Compensation Claim
What is a Data Breach Claim? “Someone stole my personal information and I want something [...]
ISO 27001: Steps to Write a Statement of Applicability
ISO 27001 Statement of Applicability A central component of becoming compliant with ISO 27001 is [...]
How to Respond When Data Breaches Hit the Fan
Not many companies anticipate being the focal point of a significant data breach incident. However, [...]
Navigating PPI Principals of GDPR for Small Businesses
“So, all we have to do to implement these 11 chapters containing 91 articles in [...]