The Six Data Processing Principles of the UK GDPR Explained
Article 5 of the UK GDPR (General Data Protection Regulation) sets out…
A Guide to TOMs (technical and organisational measures) under the GDPR
The GDPR (General Data Protection Regulation) references “appropriate technical and organisational measures”…
7 Key Stages of the Data Protection Impact Assessment (DPIA)
The GDPR (General Data Protection Regulation) requires organisations to conduct a DPIA (data…
Data Protection Enforcement: Your Cookie Compliance Questions Answered
ICO cookie compliance crackdown Earlier this year, the ICO (Information Commissioner’s Office)…
Global Data Breaches and Cyber Attacks in July 2025: over 14.9 million records exposed
IT Governance 12th August 2025 Summary Total number of incidents…
Global Data Breaches and Cyber Attacks in August 2025: over 17.3 million records exposed
IT Governance 8th September 2025 Summary Total number of incidents…
Nine Steps to SOC 2 Compliance – Including a SOC 2 Readiness Checklist
SOC (System and Organization Controls) audits provide an independent assessment of the risks…
What are the Different Types of Penetration Test?
And how do you choose the right one for your needs? Penetration…
The 4 CRISC Domains Explained
The CRISC® (Certified in Risk and Information Systems Control®) certification from ISACA®…
The 9 CISMP Domains Explained
The CISMP (Certificate in Information Security Management Principles) is one of the…



















