Celebrating No More Ransom: four years of fighting back against ransomware

Vulnerability management

Sometimes, the good guys fight back. As ransomware attacks increased over the past decade, law enforcement and the security industry joined forces to tackle the threat. Today, 27 July, marks the fourth anniversary of that collaboration, No More Ransom.  No More Ransom launched in July 2016 as a joint initiative of the Dutch National Police, […]

Today’s ECJ Privacy Shield ruling

Today, July 16, the European Court of Justice (ECJ) ruled that the agreement to allow data transfer between the EU and the United States, known as Privacy Shield, is no longer valid. Under Privacy Shield, US intelligence services had access to this data for national security reasons but the EJC’s decision has struck out the […]

Security Roundup July 2020

Cybersecurity

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. Summer school scheme for security hopefuls tackles skills shortfall Hiring people into security roles has always been a challenge. Internship offers – often a well-trodden path into the security industry – have dried up due to the restrictions stemming from […]

Five data protection steps for life after Brexit

Data Protection Implications - Brexit

You’d be forgiven for thinking Covid-19 had cancelled Brexit given the lack of attention it’s got in recent weeks. No news is good news, or so they say. However the EU/UK cogs are slowly turning back to full steam ahead in negotiating a deal. The transitional arrangement, which has the UK out politically but still […]

Security Roundup June 2020

Cybersecurity

Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. Follow the money: financial motives figure highly in breaches, finds Verizon DBIR Not even a pandemic could stop the publication of the 2020 Verizon Data Breach Investigations Report. Widely respected as an independent source of security information, some highlights from […]

Security Roundup June 2020

Cybersecurity

Infosec eye Curated advice, guidance, learning and trends in security and privacy, as chosen by our consultants. Follow the money: financial motives figure highly in breaches, finds Verizon DBIR Not even a pandemic could stop the publication of the 2020 Verizon Data Breach Investigations Report. Widely respected as an independent source of security information, some […]

Gauging the GDPR journey over the first two years

GDPR Starter Pack

This week marks the second anniversary of the EU GDPR coming into force. Reflecting on what has changed since May 2018, it seems to me that although we have traveled well, we are not quite at our destination. There needs to be regulations on the one hand, which we have by definition, and consumer awareness […]

Security Roundup May 2020

Cybersecurity

Cybersecurity trends from across the globe, with an eye on the future of security and privacy, as chosen by our consultants. Works hard for the money: funding concerns for EU data protection regulators  Are Europe’s data protection authorities sufficiently well funded to defend themselves in court against the technology industry’s heavy hitters? A report by Brave into regulators’ budgets […]

How ISO 27001 & ISO 27701 can help in managing GDPR compliance risk post Brexit

ISO 27001 - EU Flag & UK Flag

As we know, the UK left the European Union on 31 January and has now entered an 11-month transition period. In the meantime, the UK effectively remains in the EU’s customs union and single market and continues to obey EU rules. One of the many areas this affects is data protection. EU-based data controllers like […]

Here’s why now is a good time to check your Business Continuity Plan

People preparing a Business Continuity Plan

A Business Continuity Plan, or “BCP”, is often spoken of in hypothetical terms. We think about a range of potential scenarios and ask the question: “what would happen if…?” Those of us lucky enough to still be working are experiencing some of these scenarios in real time. In the previous blog, we looked at the […]