“Consent or Pay”: The Price of Privacy
Learn more about the contentious “consent or pay” method used by online platforms, the reasons why it is so controversial, and what the regulators are saying about it.
Thomas Quinn
Read More
Digital Operational Resilience Act (DORA) Explained
Luke Peach
Read More
Security training – How to ensure your training is effective
Euan Henderson
Read More
What to Do if You Become Aware of a Breach
Euan Henderson
Read More
Latest from the blog
“Consent or Pay”: The Price of Privacy
Thomas Quinn
Read More
Digital Operational Resilience Act (DORA) Explained
Luke Peach
Read More
Security training – How to ensure your training is effective
Euan Henderson
Read More
What to Do if You Become Aware of a Breach
Euan Henderson
Read More
Workplace Special Category Data
Isha Mishra
Read More
Cyber Essentials Changes for 2025
Matty Dunlop
Read More
Notice & consent compliance in US, China & Canada
Jahnavi Mehta
Read More
What is a Cyber Advisor?
Jemma Aldridge
Read More
Tech Talk: Behind the curtain - Obfuscating Linux Symbols
Keiran Mather
Read More
Tech Talk: Abusing ESC13 from Linux
Keiran Mather
Read More
Beyond Cyber Essentials: securing critical operations
Joe A. J. Beaumont
Read More
What is ransomware - a quick guide with videos
Ayisha Bari
Read More
How to Get Started with Red Teaming – Expert Tips
Dominic Mortimer
Read More
What is Quishing?
Jason McNicholas
Read More
What is Phishing? A Quick Start Guide with Videos
Ayisha Bari
Read More
Hackers uncovered: how they hacked the Olympics
Oliver Pinson-Roxburgh
Read More
What is SOC 2 Compliance?
Eze Adighibe
Read More
Network boundaries & Cyber Essentials
Jemma Aldridge
Read More
Why you need a consultant to pass ISO 27001
Nicky Whiting
Read More
US Data Transfers and the Data Transfers Bridge
Richard Bradley
Read More
How Much DPO Time is Right for Your Business?
Nicky Whiting
Read More
Tech Talk: Supply Chain Hardware Hacking
Chay Donohoe
Read More
What is supplier due diligence?
Rebecca Bada
Read More
Penetration Testing for Compliance
Joe A. J. Beaumont
Read More
What is ISMS?
Luke Peach
Read More
A Candid Chat With our Red Team Penetration Testers
Jordan Constantine
Read More
Can you Cheat Cyber Essentials? Your Questions Answered
Luke Peach
Read More
Lessons Learned from 5 Years of GDPR
Richard Bradley
Read More
Cyber security isn’t IT: 5 key dangers
Joe A. J. Beaumont
Read More
What is a vCISO?
Eze Adighibe
Read More
Why you’re struggling with data protection
Rebecca Bada
Read More
What you need to know about Cyber Essentials 2023 update
Jamie Testouri
Read More
How Do Hackers Hide?
Joe A. J. Beaumont
Read More
How to get the most out of your pen test remediations
Joe A. J. Beaumont
Read More
Your DPO Questions Answered
Luke Peach
Read More
How a vCISO can help you with ISO 27001 compliance
Nicky Whiting
Read More
Penetration Testing - Your Questions Answered
Jason Charalambous
Read More
Important changes to ISO 27001 in 2022
Nicky Whiting
Read More
Hack the Box Business CTF 2022: Challenge 1 - PhishTale
Jason Charalambous
Read More
GDPR Article 14: Where did you get my personal data?
Ali Ahsan
Read More
Hack the Box 2022- Capture the Flag for Business: A hacking competition for companies
Rajnish Ghaly
Read More
Key Steps to Implementing ISO 27001
Nicky Whiting
Read More
Data: A New Direction - what is it & what is being proposed?
Neil Barnes
Read More
IoT and the GDPR - How to stay compliant
Adindu Nwichi
Read More
Outsourcing your SOC
Brian Wagner
Read More
Understanding the importance of data retention
Rebecca Bada
Read More
Implementing ISO 27001- What are the Challenges?
Nicky Whiting
Read More
A CISO's Guide for Measuring your Security
Eze Adighibe
Read More
Consent versus legitimate interest – know the difference
Rebecca Bada
Read More
5 Top Tips for Password Management
Emma Dockerill
Read More
Meet Civo- Clients in the Spotlight
Rajnish Ghaly
Read More
Bcc for Email and Bcc Incidents Explained
Richard Bradley
Read More
Raspberry Pi and Linux Machines top target for default credential hacking
Brian Wagner
Read More
Understanding the business value of a virtual CISO
Nicky Whiting
Read More
#BreakTheBias International Women's
Rajnish Ghaly
Read More
ISO 27001 compliance: What you need to know in 2022
Nicky Whiting
Read More
Cyber security advice during the Ukraine conflict
Oliver Pinson-Roxburgh
Read More
How has COVID impacted the Cyber Sector?
Oliver Pinson-Roxburgh
Read More
Key Cyber Security Tips to Secure Your Business in 2022
Oliver Pinson-Roxburgh
Read More
Employee Monitoring – Who’s watching you?
Richard Bradley
Read More
Businesses Leave Critical Vulnerabilities Unpatched
Oliver Pinson-Roxburgh
Read More
What is CHECK and CREST Penetration Testing
Jordan Constantine
Read More
Economy of hacking: how do hackers make money?
Joseph Poppy
Read More
Cloud computing: biggest risks and best practices
Kieran Roberts
Read More
What are cookies and how to lawfully use them
Richard Bradley
Read More
The 2022 Cyber Essentials Update Special
Nicky Whiting
Read More
Being Aware Of The 6 Different Types Of Hackers
Kieran Roberts
Read More
Partner of the Year Awards 2021
Andy Smith
Read More
Log4j detecting an attack and compromise in logs
Brian Wagner
Read More
Top 5 Most Common Application Vulnerabilities in the UK
Oliver Pinson-Roxburgh
Read More
What are Data Processing Agreements?
Neil Barnes
Read More
Why is Social Engineering so Effective?
Kieran Roberts
Read More
Social Engineering Attacks and How to Prevent Them
Kieran Roberts
Read More
What is Data Protection by Design?
Ali Ahsan
Read More
The Future of UK International Data Transfers
Ali Ahsan
Read More
A day in the life of our penetration testers
Emma Dockerill
Read More
Data protection and the age-appropriate design code
Adindu Nwichi
Read More
5 reasons why you need cyber essentials
Emma Dockerill
Read More
Meet the Penetration Testing Team
Emma Dockerill
Read More
Security measures for data protection
Rebecca Bada
Read More
EU representation – what UK businesses need to know
Nicky Whiting
Read More
Penetration testing: a how-to guide for enterprises
Oliver Pinson-Roxburgh
Read More
Your Guide to Endpoint Detection and Response
Joe A. J. Beaumont
Read More
How to Report a GDPR Data Breach
Rebecca Bada
Read More
Inside Threats- Detection & Remediation in Cyber Security
Emma Dockerill
Read More
Why SMEs need to be Aware of Cyber Security
Joe A. J. Beaumont
Read More
The Cost Of ISO & GDPR Non-Compliance
Joe A. J. Beaumont
Read More
Spear Phishing – What It Is And How To Prevent It
Joe A. J. Beaumont
Read More
How to manage data subject access requests (DSARS)
Vera Ishani
Read More
How to Better Understand IT Security
Joe A. J. Beaumont
Read More
A Guide to Network Intrusion Detection Systems
Joe A. J. Beaumont
Read More
What is PECR and When Does it Apply?
Rebecca Bada
Read More
HIDS – A Guide To Host Based Intrusion Detection Systems
Joe A. J. Beaumont
Read More
Advocating for women in tech this international women’s day
Emma Dockerill
Read More
What matters most: vulnerability scans or pen tests?
Joe A. J. Beaumont
Read More
What Is a GDPR Breach?
Joe A. J. Beaumont
Read More
Brexit update: what the trade deal means for UK businesses
Nicky Whiting
Read More
Biggest Data Breaches & What We Can Learn From Them
Emma Dockerill
Read More
Your Guide to Intrusion Detection Systems
Emma Dockerill
Read More
Biggest cyber attacks of 2020 & what we can learn from them
Joe A. J. Beaumont
Read More
Meet the Compliance Team
Emma Dockerill
Read More
5 Reasons You Need To Pen Test in 2021
Joe A. J. Beaumont
Read More
The Sunburst Attack- Everything you Need to Know
Andy Smith
Read More
Four things hackers don’t want you to know
Joe A. J. Beaumont
Read More
2020 data breaches: lessons from our DPOs
Nicky Whiting
Read More
Top cyber security stats you need to know for 2021
Oliver Pinson-Roxburgh
Read More
Spotlight on Training- Gamification in Cyber Security
Emma Dockerill
Read More
What is ethical hacking & how can it secure your business?
Kieran Roberts
Read More
Everything you need to know about DPO for schools
Luke Peach
Read More
Getting cyber security buy-in from the board
Joe A. J. Beaumont
Read More
The importance of cyber training for remote workers
Oliver Pinson-Roxburgh
Read More
How to secure your remote workforce
Joe A. J. Beaumont
Read More
GDPR 2 years on – key takeaways and lessons learnt
Joe A. J. Beaumont
Read More
Understanding the role and responsibilities of the DPO
Nicky Whiting
Read More
Why cyber security is even more important in the wake of Covid-19
Joe A. J. Beaumont
Read More
The rush to secure remote working
Oliver Pinson-Roxburgh
Read More
Women in Cyber Security- Open Letter
Emma Dockerill
Read More
Cyber security stats you should know for 2020
Joseph Poppy
Read More
Bulletproof goes to space
Joseph Poppy
Read More
What is a Data Protection Officer?
Joseph Poppy
Read More
Player ‘cyber criminal’ has entered the game
Joseph Poppy
Read More
What is the cyber kill chain?
Joseph Poppy
Read More
Working at Bulletproof
Joseph Poppy
Read More
ICO finally bears its teeth
Joseph Poppy
Read More
Ryuk is Coming
Joseph Poppy
Read More
The dangers of public Wi-Fi
Joseph Poppy
Read More
Cyber security isn’t magic... Or is it?
Joe A. J. Beaumont
Read More
Bulletproof’s international man of compliance
Luke Peach
Read More
Getting to know your data breaches
Luke Peach
Read More
What happens when hackers get physical?
Joe A. J. Beaumont
Read More
Bot or not? It’s about to become a lot harder to tell.
Joseph Poppy
Read More
A cyber security health check for the most vulnerable
Joseph Poppy
Read More
The shortage of women in cyber security
Joseph Poppy
Read More
Corporate or Start Up: Who’s Most at Risk?
Joseph Poppy
Read More
Red team testing: hacking and lying your way to data
Tom Wyatt
Read More
What does a compliance consultant do?
Luke Peach
Read More
Five top tips for booking a penetration test
Joseph Poppy
Read More
Cyber security and AI: nothing to fear?
Joseph Poppy
Read More
To phish or not to phish?
Joseph Poppy
Read More
Compliance is not security
Oliver Pinson-Roxburgh
Read More
Appointing a DPO
Luke Peach
Read More
What happened when we hacked an expo?
Tom Wyatt
Read More
How long is your dwell time?
Oliver Pinson-Roxburgh
Read More
Trusted cyber security & compliance services from a certified provider
Get a quote today
If you are interested in our services, get a free, no obligation quote today by filling out the form below.