Posts

The apps are deemed malicious by doing things such as capturing pictures and…

Thanks to auto-play, it’s possible to crash Windows systems by simply inserting the…

Twitter is the latest company to face backlash for how it handles data…

One of the key objectives of the NIS Directive is to ensure that…

The implementation of the EU Security of Networks and Information Systems (NIS) Directive…

D1 Response and Recovery Planning Capabilities to minimise the impact of a cyber…

C1 Security Monitoring Capabilities to ensure security defences remain effective and to detect…

A1 Governance Appropriate organisational structures, policies, and processes in place to understand, assess and…

B1 Service Protection Policies and Processes Proportionate security measures in place to protect…