Latest Cyber Security News
Is DORA Applicable in the US?
How DORA affects US ICT service providers DORA (the Digital Operational Resilience…
The GDPR’s Six Lawful Bases For Processing
Under the GDPR (General Data Protection Regulation), a lawful basis must be…
What AWS and Cloudflare Outages Teach Us About Cloud Configuration Risks
On Tuesday, 18 November, a Cloudflare outage took a significant part of…
The Data (Use and Access) Act and How it Affects the UK GDPR and DPA 2018, and PECR
Enacted in June, the Data (Use and Access) Bill – now the…
Phishing Season 2025: How AI is Supercharging Cyber Crime
Phishing attacks tend to peak at the end of each year as…
GRC Solutions Named Among the UK’s Top 20 Cyber Security Innovators
We’re delighted to announce that GRC Solutions – the new name for…
Global Data Breaches and Cyber Attacks in October 2025 – At Least 21.2 Million Breached Records
IT Governance 14th November 2025 Summary Total number of incidents…
Data Leakage Prevention and Data Deletion – ISO 27001 Controls 8.12 and 8.12 Explained
ISO 27001:2022 introduced several new controls designed to reflect modern security practices…
Threat Intelligence – ISO 27001:2022 Control 5.7 Explained
Cyber attacks evolve faster than traditional security review cycles. So, to stay…
How To Comply with ISO 27001’s New Cloud Services Control
The 2022 update to ISO 27001 introduced a new control for the…



















