Did Crowdstrike cause GDPR personal data breaches?
- Nov 21, 2023
- 3 min
SEC Cybersecurity Rule 2023 - new transparency rules for corporate governance and incident response
- Nov 19, 2023
- 5 min
Ransoms and CISOs - charting the best course through treacherous waters
- Nov 15, 2023
- 2 min
NCSC Annual Review - maintaining resilience in an evolving threat landscape
- Nov 8, 2023
- 2 min
Important new case alert! A security breach doesn’t require a circumvention of security controls
- Nov 7, 2023
- 2 min
Bad tech design increases the digital divide. D&I implications for cybersecurity
- Nov 6, 2023
- 1 min
Is Cybersecurity a line or a circle? The shape impacts the quality of incident incident response
- Nov 2, 2023
- 1 min
SolarWinds is a cybersecurity game changer
- Nov 1, 2023
- 6 min
Biden's AI agenda and the cybersecurity issues and risks
- Oct 31, 2023
- 4 min
Key legislation. The Communications Act
- Oct 27, 2023
- 5 min
Okta breach raises critical concerns about due diligence and accountability
- Oct 26, 2023
- 3 min
The cybersecurity ecosystem's raggedy regulatory blanket
- Oct 25, 2023
- 4 min
Where do we find the detail of security law? Part 4.
- Oct 24, 2023
- 4 min
Key legislation. The Computer Misuse Act
- Oct 21, 2023
- 3 min
Cryptography is the cyberspace’s Higgs Boson. Part 2., Hashes.
- Oct 20, 2023
- 3 min
Where do we find the detail of security law? Part 3.
- Oct 19, 2023
- 4 min
Cryptography is the cyberspace's Higgs Boson. Part 1., Encryption.
- Oct 18, 2023
- 6 min
Equifax fine highlights supply chain and incident response risks
- Oct 17, 2023
- 3 min
Is multi factor authentication compulsory in law?
- Oct 17, 2023
- 5 min
Key legislation. The General Data Protection Regulation
- Oct 13, 2023
- 4 min
Data breach claims are successful in the US, so what's this GDPR "gold standard" all about then?
- Oct 13, 2023
- 3 min
Incident response priorities need multiple lenses and trade-offs
- Oct 12, 2023
- 5 min
Cybercrime growth is unstoppable and these are the reasons why ...
- Oct 10, 2023
- 6 min
Litigation risk after a cyber-attack