Posts

Exploitation can result in hackers gaining access to full browsing histories and all…

Vulnerable in-vehicle infotainment systems have left some Volkswagen cars open to remote hacking,…

The apps are deemed malicious by doing things such as capturing pictures and…

Thanks to auto-play, it’s possible to crash Windows systems by simply inserting the…

Twitter is the latest company to face backlash for how it handles data…

The implementation of the EU Security of Networks and Information Systems (NIS) Directive…

D1 Response and Recovery Planning Capabilities to minimise the impact of a cyber…

C1 Security Monitoring Capabilities to ensure security defences remain effective and to detect…

A1 Governance Appropriate organisational structures, policies, and processes in place to understand, assess and…

B1 Service Protection Policies and Processes Proportionate security measures in place to protect…