Posts

Exploitation can result in hackers gaining access to full browsing histories and all…

Vulnerable in-vehicle infotainment systems have left some Volkswagen cars open to remote hacking,…

The apps are deemed malicious by doing things such as capturing pictures and…

Thanks to auto-play, it’s possible to crash Windows systems by simply inserting the…

Twitter is the latest company to face backlash for how it handles data…

One of the key objectives of the NIS Directive is to ensure that…

The implementation of the EU Security of Networks and Information Systems (NIS) Directive…

D1 Response and Recovery Planning Capabilities to minimise the impact of a cyber…

C1 Security Monitoring Capabilities to ensure security defences remain effective and to detect…

A1 Governance Appropriate organisational structures, policies, and processes in place to understand, assess and…