Break or Go with the Chain?
Hacking activities are increasing their playing fields
Secure organisations’ supply chains through Cyber Essentials Certification
Ongoing major trends in Cyber Security space; from iOT innovation to 3rd parties risk, and to resources & skills
New that's going around on the other end of the world, published by IT Governance Ltd.
Is this an extension of DPA- Data Protection Act?
"see no evil, hear no evil, speak no evil" . More exploits found in things that our daily life depends on.
Take the chance on those who go through the challenges, and learn from them the successful practices now.
Emulate the law of nature for your business ecosystem
ISO 37001:2016 ABMS is designed to help organisations put in place an anti-bribery management system to support compliance with bribery and corruption laws across the world
System used at military premises to access the Internet has resulted in the theft of the personal data
From counting the no. of records leaked to anticipating the global cost of the data breaches