The place for security news and views

Welcome to the Bulletproof blog. This is where you'll find us talking about all things infosec, whatever happens to be on our mind. We cover a range of topics, so no matter what your interest in cyber security, you'll find a blog post to suit you.

Tags

Social

Latest from the blog

GDPR & Data Protection

“Consent or Pay”: The Price of Privacy

Thomas Quinn

Compliance

Digital Operational Resilience Act (DORA) Explained

Luke Peach

Training Services

Security training – How to ensure your training is effective

Euan Henderson

Threat Management

What to Do if You Become Aware of a Breach

Euan Henderson

GDPR & Data Protection

Workplace Special Category Data

Isha Mishra

Compliance

Cyber Essentials Changes for 2025

Matty Dunlop

GDPR & Data Protection

Notice & consent compliance in US, China & Canada

Jahnavi Mehta

Compliance

What is a Cyber Advisor?

Jemma Aldridge

Hacking & Tech

Tech Talk: Behind the curtain - Obfuscating Linux Symbols

Keiran Mather

Hacking & Tech

Tech Talk: Abusing ESC13 from Linux

Keiran Mather

Strategy & Insight

Beyond Cyber Essentials: securing critical operations

Joe A. J. Beaumont

Cyber Security

What is ransomware - a quick guide with videos

Ayisha Bari

Strategy & Insight

How to Get Started with Red Teaming – Expert Tips

Dominic Mortimer

Cyber Security

What is Quishing?

Jason McNicholas

Cyber Security

What is Phishing? A Quick Start Guide with Videos

Ayisha Bari

Hacking & Tech

Hackers uncovered: how they hacked the Olympics

Oliver Pinson-Roxburgh

Compliance

What is SOC 2 Compliance?

Eze Adighibe

Compliance

Network boundaries & Cyber Essentials

Jemma Aldridge

GDPR & Data Protection

Why you need a consultant to pass ISO 27001

Nicky Whiting

GDPR & Data Protection

US Data Transfers and the Data Transfers Bridge

Richard Bradley

GDPR & Data Protection

How Much DPO Time is Right for Your Business?

Nicky Whiting

Hacking & Tech

Tech Talk: Supply Chain Hardware Hacking

Chay Donohoe

Cyber Security

What is supplier due diligence?

Rebecca Bada

Compliance

Penetration Testing for Compliance

Joe A. J. Beaumont

GDPR & Data Protection

What is ISMS?

Luke Peach

Penetration Testing

A Candid Chat With our Red Team Penetration Testers

Jordan Constantine

Compliance

Can you Cheat Cyber Essentials? Your Questions Answered

Luke Peach

GDPR & Data Protection

Lessons Learned from 5 Years of GDPR

Richard Bradley

Compliance

Cyber security isn’t IT: 5 key dangers

Joe A. J. Beaumont

Compliance

What is a vCISO?

Eze Adighibe

GDPR & Data Protection

Why you’re struggling with data protection

Rebecca Bada

Compliance

What you need to know about Cyber Essentials 2023 update

Jamie Testouri

Hacking & Tech

How Do Hackers Hide?

Joe A. J. Beaumont

Penetration Testing

How to get the most out of your pen test remediations

Joe A. J. Beaumont

GDPR & Data Protection

Your DPO Questions Answered

Luke Peach

Strategy & Insight

How a vCISO can help you with ISO 27001 compliance

Nicky Whiting

Penetration Testing

Penetration Testing - Your Questions Answered

Jason Charalambous

Compliance

Important changes to ISO 27001 in 2022

Nicky Whiting

Penetration Testing

Hack the Box Business CTF 2022: Challenge 1 - PhishTale

Jason Charalambous

GDPR & Data Protection

GDPR Article 14: Where did you get my personal data?

Ali Ahsan

Penetration Testing

Hack the Box 2022- Capture the Flag for Business: A hacking competition for companies

Rajnish Ghaly

Compliance

Key Steps to Implementing ISO 27001

Nicky Whiting

GDPR & Data Protection

Data: A New Direction - what is it & what is being proposed?

Neil Barnes

GDPR & Data Protection

IoT and the GDPR - How to stay compliant

Adindu Nwichi

Threat Management

Outsourcing your SOC

Brian Wagner

Compliance

Understanding the importance of data retention

Rebecca Bada

Compliance

Implementing ISO 27001- What are the Challenges?

Nicky Whiting

Strategy & Insight

A CISO's Guide for Measuring your Security

Eze Adighibe

GDPR & Data Protection

Consent versus legitimate interest – know the difference

Rebecca Bada

Cyber Security

5 Top Tips for Password Management

Emma Dockerill

People & Work

Meet Civo- Clients in the Spotlight

Rajnish Ghaly

Compliance

Bcc for Email and Bcc Incidents Explained

Richard Bradley

Cyber Security

Raspberry Pi and Linux Machines top target for default credential hacking

Brian Wagner

Strategy & Insight

Understanding the business value of a virtual CISO

Nicky Whiting

People & Work

#BreakTheBias International Women's

Rajnish Ghaly

Compliance

ISO 27001 compliance: What you need to know in 2022

Nicky Whiting

Cyber Security

Cyber security advice during the Ukraine conflict

Oliver Pinson-Roxburgh

Cyber Security

How has COVID impacted the Cyber Sector?

Oliver Pinson-Roxburgh

Cyber Security

Key Cyber Security Tips to Secure Your Business in 2022

Oliver Pinson-Roxburgh

People & Work

Employee Monitoring – Who’s watching you?

Richard Bradley

Penetration Testing

Businesses Leave Critical Vulnerabilities Unpatched

Oliver Pinson-Roxburgh

Penetration Testing

What is CHECK and CREST Penetration Testing

Jordan Constantine

Hacking & Tech

Economy of hacking: how do hackers make money?

Joseph Poppy

Cyber Security

Cloud computing: biggest risks and best practices

Kieran Roberts

GDPR & Data Protection

What are cookies and how to lawfully use them

Richard Bradley

Compliance

The 2022 Cyber Essentials Update Special

Nicky Whiting

Hacking & Tech

Being Aware Of The 6 Different Types Of Hackers

Kieran Roberts

People & Work

Partner of the Year Awards 2021

Andy Smith

Threat Management

Log4j detecting an attack and compromise in logs

Brian Wagner

Penetration Testing

Top 5 Most Common Application Vulnerabilities in the UK

Oliver Pinson-Roxburgh

Compliance

What are Data Processing Agreements?

Neil Barnes

Cyber Security

Why is Social Engineering so Effective?

Kieran Roberts

Cyber Security

Social Engineering Attacks and How to Prevent Them

Kieran Roberts

GDPR & Data Protection

What is Data Protection by Design?

Ali Ahsan

GDPR & Data Protection

The Future of UK International Data Transfers

Ali Ahsan

Penetration Testing

A day in the life of our penetration testers

Emma Dockerill

GDPR & Data Protection

Data protection and the age-appropriate design code

Adindu Nwichi

Compliance

5 reasons why you need cyber essentials

Emma Dockerill

Penetration Testing

Meet the Penetration Testing Team

Emma Dockerill

Compliance

Security measures for data protection

Rebecca Bada

GDPR & Data Protection

EU representation – what UK businesses need to know

Nicky Whiting

Penetration Testing

Penetration testing: a how-to guide for enterprises

Oliver Pinson-Roxburgh

Threat Management

Your Guide to Endpoint Detection and Response

Joe A. J. Beaumont

GDPR & Data Protection

How to Report a GDPR Data Breach

Rebecca Bada

Cyber Security

Inside Threats- Detection & Remediation in Cyber Security

Emma Dockerill

Cyber Security

Why SMEs need to be Aware of Cyber Security

Joe A. J. Beaumont

GDPR & Data Protection

The Cost Of ISO & GDPR Non-Compliance

Joe A. J. Beaumont

Cyber Security

Spear Phishing – What It Is And How To Prevent It

Joe A. J. Beaumont

GDPR & Data Protection

How to manage data subject access requests (DSARS)

Vera Ishani

Cyber Security

How to Better Understand IT Security

Joe A. J. Beaumont

Threat Management

A Guide to Network Intrusion Detection Systems

Joe A. J. Beaumont

GDPR & Data Protection

What is PECR and When Does it Apply?

Rebecca Bada

Threat Management

HIDS – A Guide To Host Based Intrusion Detection Systems

Joe A. J. Beaumont

People & Work

Advocating for women in tech this international women’s day

Emma Dockerill

Penetration Testing

What matters most: vulnerability scans or pen tests?

Joe A. J. Beaumont

GDPR & Data Protection

What Is a GDPR Breach?

Joe A. J. Beaumont

GDPR & Data Protection

Brexit update: what the trade deal means for UK businesses

Nicky Whiting

Cyber Security

Biggest Data Breaches & What We Can Learn From Them

Emma Dockerill

Threat Management

Your Guide to Intrusion Detection Systems

Emma Dockerill

Cyber Security

Biggest cyber attacks of 2020 & what we can learn from them

Joe A. J. Beaumont

Compliance

Meet the Compliance Team

Emma Dockerill

Penetration Testing

5 Reasons You Need To Pen Test in 2021

Joe A. J. Beaumont

Cyber Security

The Sunburst Attack- Everything you Need to Know

Andy Smith

Hacking & Tech

Four things hackers don’t want you to know

Joe A. J. Beaumont

GDPR & Data Protection

2020 data breaches: lessons from our DPOs

Nicky Whiting

Cyber Security

Top cyber security stats you need to know for 2021

Oliver Pinson-Roxburgh

Cyber Security

Spotlight on Training- Gamification in Cyber Security

Emma Dockerill

Hacking & Tech

What is ethical hacking & how can it secure your business?

Kieran Roberts

GDPR & Data Protection

Everything you need to know about DPO for schools

Luke Peach

People & Work

Getting cyber security buy-in from the board

Joe A. J. Beaumont

Compliance

The importance of cyber training for remote workers

Oliver Pinson-Roxburgh

Compliance

How to secure your remote workforce

Joe A. J. Beaumont

GDPR & Data Protection

GDPR 2 years on – key takeaways and lessons learnt

Joe A. J. Beaumont

GDPR & Data Protection

Understanding the role and responsibilities of the DPO

Nicky Whiting

People & Work

Why cyber security is even more important in the wake of Covid-19

Joe A. J. Beaumont

Compliance

The rush to secure remote working

Oliver Pinson-Roxburgh

People & Work

Women in Cyber Security- Open Letter

Emma Dockerill

Cyber Security

Cyber security stats you should know for 2020

Joseph Poppy

People & Work

Bulletproof goes to space

Joseph Poppy

GDPR & Data Protection

What is a Data Protection Officer?

Joseph Poppy

Hacking & Tech

Player ‘cyber criminal’ has entered the game

Joseph Poppy

Penetration Testing

What is the cyber kill chain?

Joseph Poppy

People & Work

Working at Bulletproof

Joseph Poppy

Compliance

ICO finally bears its teeth

Joseph Poppy

Cyber Security

Ryuk is Coming

Joseph Poppy

Cyber Security

The dangers of public Wi-Fi

Joseph Poppy

Cyber Security

Cyber security isn’t magic... Or is it?

Joe A. J. Beaumont

Compliance

Bulletproof’s international man of compliance

Luke Peach

Cyber Security

Getting to know your data breaches

Luke Peach

Hacking & Tech

What happens when hackers get physical?

Joe A. J. Beaumont

Hacking & Tech

Bot or not? It’s about to become a lot harder to tell.

Joseph Poppy

Cyber Security

A cyber security health check for the most vulnerable

Joseph Poppy

People & Work

The shortage of women in cyber security

Joseph Poppy

Cyber Security

Corporate or Start Up: Who’s Most at Risk?

Joseph Poppy

Penetration Testing

Red team testing: hacking and lying your way to data

Tom Wyatt

Compliance

What does a compliance consultant do?

Luke Peach

Penetration Testing

Five top tips for booking a penetration test

Joseph Poppy

Cyber Security

Cyber security and AI: nothing to fear?

Joseph Poppy

Cyber Security

To phish or not to phish?

Joseph Poppy

Cyber Security

Compliance is not security

Oliver Pinson-Roxburgh

GDPR & Data Protection

Appointing a DPO

Luke Peach

Hacking & Tech

What happened when we hacked an expo?

Tom Wyatt

Threat Management

How long is your dwell time?

Oliver Pinson-Roxburgh


Trusted cyber security & compliance services from a certified provider


Get a quote today

If you are interested in our services, get a free, no obligation quote today by filling out the form below.

(1,500 characters limit)

For more information about how we collect, process and retain your personal data, please see our privacy policy.