Phishing Season 2025: How AI is Supercharging Cyber Crime
Phishing attacks tend to peak at the end of each year as…
GRC Solutions Named Among the UK’s Top 20 Cyber Security Innovators
We’re delighted to announce that GRC Solutions – the new name for…
Global Data Breaches and Cyber Attacks in October 2025 – At Least 21.2 Million Breached Records
IT Governance 14th November 2025 Summary Total number of incidents…
Data Leakage Prevention and Data Deletion – ISO 27001 Controls 8.12 and 8.12 Explained
ISO 27001:2022 introduced several new controls designed to reflect modern security practices…
Turning Quality into Code with a Quality Rubric
Building high-quality labeled datasets is one of the most complex aspects of…
Building Safer AI with Human Oversight
AI systems are becoming more powerful, but also more vulnerable to manipulation.…
Threat Intelligence – ISO 27001:2022 Control 5.7 Explained
Cyber attacks evolve faster than traditional security review cycles. So, to stay…
How To Comply with ISO 27001’s New Cloud Services Control
The 2022 update to ISO 27001 introduced a new control for the…
20 Best 3D Point Cloud Datasets for Agricultural AI
Digital farming has revolutionized agricultural practices, with 3D point cloud datasets as…
How DORA fits with ISO 27001, NIS2 and the GDPR
Although DORA (the EU Digital Operational Resilience Act) has been in effect…



















