5 Min
What can the Uber breach teach us about information security?
Uber’s 2022 data breach: All you need to know. Learn how you can reduce risk of data breach with ISO 27001 certification.
Read More
5 Min
Uber’s 2022 data breach: All you need to know. Learn how you can reduce risk of data breach with ISO 27001 certification.
Read More
6 Min
What does EU Whistleblowing Directive mean for you? Why is privacy and whistleblower confidentiality important? Learn how to become more secure and compliant.
Read More
6 Min
Web App Pentesting helps to build secure web based softwares, protects users from cyber threats and ensures InfoSec compliancy. Read on to learn more.
Read More
3 Min
Understanding the difference between risk, threat & vulnerability is the first step toward protecting the sensitive data of your organisation. Learn more.
Read More
4 Min
Classifying information helps you store and protect information according to sensitivity and stakeholder needs. Learn more about classification types.
Read More
6 Min
Organisations can benefit from ISO 27701 compliance by customising their policies to fit global data protection laws. Read on to learn how.
Read More
5 Min
A data retention policy is proof of a company's compliance with legal standards and protects personal data from attacks. Read more about how to create your own.
Read More
5 Min
Know how to handle Data Subject Access Requests (DSARs) under UK GDPR. Get insights into compliance, response strategies, and request management.
Read More
3 Min
Voluntarily given, zero-party data helps to personalise the customer experience. Read on for more on GDPR compiant zero-party data collection.
Read More
8 Min
Sensitive data needs a higher level of protection and processing conditions than personal data. Read on for some examples of sensitive data.
Read More