
How to Get Ready for Your ISO 27001 Audit
In the world of information security, there are many frameworks and countless guidelines. But among [...]
How to File a Data Breach Compensation Claim
What is a Data Breach Claim? “Someone stole my personal information and I want something [...]
ISO 27001: Steps to Write a Statement of Applicability
ISO 27001 Statement of Applicability A central component of becoming compliant with ISO 27001 is [...]
How to Respond When Data Breaches Hit the Fan
Not many companies anticipate being the focal point of a significant data breach incident. However, [...]
Navigating PPI Principals of GDPR for Small Businesses
“So, all we have to do to implement these 11 chapters containing 91 articles in [...]
Urgent Advisory: Hackers Steal $20 Million by Exploiting Flaw in Revolut’s Payment Systems
Date: 10/07/2023 Link: The Hacker News Introduction We would like to bring to your attention [...]
Importance of Black Box Testing for Your Cyber Security Defence
In a world where the digital landscape keeps changing, how can we effectively protect our [...]
Urgent Advisory: Unpatched Security Vulnerability in Ultimate Member Plugin for WordPress
Title: Unpatched Security Vulnerability in Ultimate Member Plugin for WordPress Date: 05/07/2023 Link: The HackerNews [...]
External Penetration Testing and How to Do It
What is External Penetration Testing External penetration testing also known as external network penetration testing [...]
Preparing for a SOC 2 Audit? Follow These 5 Key Steps
Thinking About Getting Your Cloud Platform SOC 2 Compliant? If your company handles sensitive data, [...]