APACHE STRUTS 2 Critical Vulnerability – CVE: 2023-50164

Risk Rating: CRITICAL CVSS Score: 9.8 Vulnerability Type: Remote Code Execution (RCE) CVE Identifier: CVE-2023-50164 Exploitation [...]

How to Implement a Clear Desk & Clear Screen Policy for Your Organisation

You know that feeling when you walk into an office, and it looks like a [...]

ISO 27001 Clauses 4-10: A Complete Guide

ISO/IEC 27001  is an international standard for creating an information security management system (ISMS). It [...]

What is Open-Source Intelligence? How to Get Started

Imagine a world intricately woven with connections, where information flows like a meandering river of [...]

NIS 2 Directive Timeline & Requirements to Minimise Risks

NIS 2 is Changing It’s getting Risky out there… The protection of our networks and [...]

How to Prepare for an ISO 27001 Audit

In the world of information security, there are many frameworks and countless guidelines. But among [...]

How to Submit a Data Breach Breach Compensation Claim

What is a Data Breach Claim? “Someone stole my personal information and I want something [...]

ISO 27001: Steps to Write a Statement of Applicability

ISO 27001 Statement of Applicability A central component of becoming compliant with ISO 27001 is [...]

How to Respond When Data Breaches Hit the Fan

Not many companies anticipate being the focal point of a significant data breach incident. However, [...]

PPI Principals of GDPR for Small Businesses: Navigating Data Protection

“So, all we have to do to implement these 11 chapters containing 91 articles in [...]

Risk Crew