Posts

Exploitation can result in hackers gaining access to full browsing histories and all…

Vulnerable in-vehicle infotainment systems have left some Volkswagen cars open to remote hacking,…

The apps are deemed malicious by doing things such as capturing pictures and…

Thanks to auto-play, it’s possible to crash Windows systems by simply inserting the…

Twitter is the latest company to face backlash for how it handles data…

A1 Governance Appropriate organisational structures, policies, and processes in place to understand, assess and…

B1 Service Protection Policies and Processes Proportionate security measures in place to protect…

Principle Staff have appropriate awareness, knowledge and skills to carry out their organisational…

One of the key objectives of the NIS Directive is to ensure that…