APACHE STRUTS 2 Critical Vulnerability – CVE: 2023-50164
Risk Rating: CRITICAL CVSS Score: 9.8 Vulnerability Type: Remote Code Execution (RCE) CVE Identifier: CVE-2023-50164 Exploitation [...]
How to Implement a Clear Desk & Clear Screen Policy for Your Organisation
You know that feeling when you walk into an office, and it looks like a [...]
ISO 27001 Clauses 4-10: A Complete Guide
ISO/IEC 27001 is an international standard for creating an information security management system (ISMS). It [...]
What is Open-Source Intelligence? How to Get Started
Imagine a world intricately woven with connections, where information flows like a meandering river of [...]
NIS 2 Directive Timeline & Requirements to Minimise Risks
NIS 2 is Changing It’s getting Risky out there… The protection of our networks and [...]
How to Prepare for an ISO 27001 Audit
In the world of information security, there are many frameworks and countless guidelines. But among [...]
How to Submit a Data Breach Breach Compensation Claim
What is a Data Breach Claim? “Someone stole my personal information and I want something [...]
ISO 27001: Steps to Write a Statement of Applicability
ISO 27001 Statement of Applicability A central component of becoming compliant with ISO 27001 is [...]
How to Respond When Data Breaches Hit the Fan
Not many companies anticipate being the focal point of a significant data breach incident. However, [...]
PPI Principals of GDPR for Small Businesses: Navigating Data Protection
“So, all we have to do to implement these 11 chapters containing 91 articles in [...]