Why you can’t wait for the EU General Data Protection Regulation – Part 2

Privacy

The draft EU General Data Protection Regulation aims to totally reform data protection legislation throughout Europe in an effort to improve online privacy rights and boost the digital economy. Currently known as the EU Data Protection Directive, the EU General Data Protection Regulation will be immediately binding in all of the EU member states when […]

ISO27001:2013 one year on – What has changed? Part two

green papers 2

A year on from the publication of ISO 27001:2013 I thought it worth reflecting on what the ‘new’ version of the specification has meant for those working with it and whether it address the criticisms levelled at the 2005 version. Last week I described how users of the standard might better embrace the 2013 version […]

The information security analyst: An interview with Stuart Ritchie-Fagg

SRF

In this interview we talk to Stuart Ritchie-Fagg, senior information security analyst. Stuart, welcome and thank you for participating in this interview.  How did you decide to embark on a career in information security?  Well, security really decided upon me.  My background was always fundamentally administration within business operations, and an opportunity arose to break […]

1 October deadline set for Cyber Essentials scheme

Cyber-Essentials-logo-HiRes

The UK government has today confirmed that, from 1 October 2014, suppliers bidding for some government contracts must comply with the new Cyber Essentials controls. Who is affected by the October deadline? UK organisations bidding for government contracts that involve the handling of sensitive and personal information and the provision of certain technical products and […]

List of Cyber Attacks and Data Breaches in September

screen-shot-2014-06-23-at-4-09-07-pm

Although this month’s list may not be as long as August’s, it’s by far the most shocking of the year so far. The number of payment card breaches in the US appears to be going up and up and an end isn’t in sight. This list will continue to be updated until the very end […]

New ‘Shellshock’ bash bug affects 500 million computers, servers and devices.

Defence shield

Bash (the Bourne Again SHell), the default command line interpreter found in Unix operating systems, has been found to be vulnerable, rendering an estimated 500 million machines open to attack. Experts warn that the CVE-2014-6271 vulnerability, which has been dubbed Shellshock, is far more serious than the Heartbleed flaw discovered in the OpenSSL cryptographic library […]

Toolkit preview shows how our ISO27001 documentation toolkit can save you weeks of work.

If you have the job of creating the documentation for an ISO27001-based information security management system, you will already know how much paperwork that involves. You might have already heard how our ISO27001 toolkit cuts the amount of work you need to do to get an ISO27001-compliant management system. Maybe you’ve thought about ordering, but […]

Are you surprised the ITIL Complementary Qualification Scheme is to be withdrawn?

AXELOS©, the owners of the ITIL® methodology, has announced that on 31 March 2015 the ITIL Complementary Qualification Scheme will be withdrawn. The ITIL complementary qualifications cover many disparate subjects that are linked to ITIL best practice and are recognised as part of the current certification portfolio. Exam candidates who have already taken or that […]

ISO27001:2013 one year on – What has changed? Part one

ddos-attack-protection-plan

A year on from the publication of ISO 27001:2013 I thought it worth reflecting on what the ‘new’ version of the specification has meant for those working with it, and whether it has addressed the criticisms levelled at the 2005 version. I’ll start by reflecting on what the 2013 version means for those that have […]

Five Must-See Cyber Crime Infographics

thumbforinfographics

Nothing gets the heart pumping on a Monday like the thrill and shock of viewing infographics about cyber crime. OK, perhaps that’s a bit of an exaggeration, but the infographics below do promise to provide you with a great insight into cyber crime and what’s being done about it. I’ve hand-picked these infographics myself and […]