Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO 42001:2023 Certification for Ethical AI Governance

ISO 42001 takes a risk-based approach and structure like other ISO standards and covers: with a focus on AI governance. Under the Annex A, it provides a list of controls, used to manage AI risks and ensure responsible deployment of AI systems. Under Annex B, it explains how to implement these controls, giving organisations the flexibility to adapt them based on their specific needs.

Wireless network pen testing How secure is your Wi-Fi?

Although wireless networks are convenient, allowing teams to stay connected - whether they’re in the office, moving between spaces, or working from home - they are inherently more exposed than wired connections as they broadcast your network to the physical world. But this convenience often leads to overlooked security gaps, especially if your Wi-Fi is not regularly reviewed or was set up using default settings. A few common issues can arise because of this, including.

NHS DSP Toolkit Submission 101: Everything you need to know to comply - Webinar Recording

Webinar recording from our 'NHS DSP Toolkit Submission 101: Everything you need to know to comply' Join us as our Data Protection Team Lead, Richard Bradley, walks you through everything you need to know about toolkit submission, including: An overview of the toolkit, who needs it and why The 10 data security standards and how it fits with the submission What you need to do to be best prepared Q&A session to ask any burning questions around the toolkit submission.

Pen Testing vs. Red Teaming: Which One Does Your Business Need?

As the world of cyber continues to change, threats aren’t just becoming more sophisticated, they’re becoming harder to detect. Whether it’s a well-planned attack that slips past your defences, or a known vulnerability in your system, the question is: how do you test your security before an attacker does? Two of the most effective approaches that Bulletproof offers are penetration testing and red teaming, and which one you choose depends on what your business is trying to achieve.

Email Penetration Testing: Defence Against Phishing Attacks

Email continues to be the main attack vector for cybercriminals, a fact driven not only by it being the most widely used communication tool in business, but also by the evolving sophistication of cyber threats. Despite advancements in cybersecurity, attackers continue to exploit human vulnerabilities to bypass technical defences.

Penetration testing frequency: Industry-specific best practices

Annual penetration testing serves as the baseline for cybersecurity best practice and can help businesses identify and address vulnerabilities before they turn into exploitable threats. While some businesses assume that once a year pen testing is sufficient, it’s worth understanding that it is a minimum requirement rather than a comprehensive security strategy.

Privacy Enhancing Technologies (PETs): Data Protection Meets Innovation

The data protection law does not define PETs; however, The European Union Agency for Cybersecurity (ENISA) refers to PETs as: ‘software and hardware solutions, i.e. systems encompassing technical processes, methods or knowledge to achieve specific privacy or data protection functionality or to protect against risks of privacy of an individual or a group of natural persons.’1 In simple terms, they are strategies and tools designed at safeguarding privacy and empowering individuals.

Manual vs Automated Penetration Testing: Pros and Cons

Manual penetration testing is a meticulous process performed by skilled cybersecurity professionals who simulate real-world attack scenarios to identify weaknesses in systems, applications, and networks. In contrast to the automated approach, manual testing leverages human expertise, creativity, and critical thinking to detect vulnerabilities in the unique context of your organisation’s infrastructure.

Cyber Essentials Plus 2025: Scope Confirmation Explained

At present, after a basic Cyber Essentials assessment is passed and the applicant moves on to CE+, there are no additional steps to clarify the devices in scope beyond getting a fresh list of devices from the applicant and ensuring no major difference between the provided list and the original list of devices declared in the Basic assessment.