
Safe Harbor Review Means Business as Usual – For Now
September was a watershed month for companies in Europe wanting to share data with the US. The General Court of the European Union rejected a chall...

September was a watershed month for companies in Europe wanting to share data with the US. The General Court of the European Union rejected a chall...
A recent incident has raised concerns about how data is handled by GenAI tools. Is it time to ensure that your data doesn’t end up in their L...
The wheels of justice move slowly sometimes. So it is in Australia, where the privacy regulator has finally filed civil penalty proceedings against...
The UK’s new Data Use and Access Bill (DUAA) received Royal Assent on 19 June 2025, marking a refresh to the country’s data protection ...
What is the Content Training Summary Template? The European Commission recently released an explanatory notice and template to help providers of g...
The SharePoint exploit was used on high-profile victims including the US National Nuclear Security Administration, the Department of Homeland Secur...
A recent Qantas data breach compromising the personal information of 5.7 million customers has highlighted the ongoing cybersecurity risk that thir...
Just before the Easter bank holiday weekend, Marks & Spencer was plunged into one of the worst ransomware breaches the country has seen in rece...
Support for Windows 10 officially ends on October 14th. As the end-of-life deadline draws nearer, organisations that haven’t already made the switc...
Phishing remains among the most common cyberattacks used by threat actors. Most businesses have seen it in action: emails requesting an ‘urgent tas...
Consumers often see most cyber attacks as something that happens to other people, until it affects them directly. The theft of email addresses and ...
The next time you slowly amble down an aeroplane aisle, spare a thought for the incredible work that got you there, from aviation engineering throu...
You might be able to defend yourself against attacks from hacktivists and even from organized criminal groups. But good luck chancing your arm agai...
The pressure on today’s security and compliance teams is relentless. With escalating regulatory demands, evolving cyber threats, and constrai...
CISOs are increasingly invited to board meetings. A Splunk survey from January found that 83% participate somewhat often or most of the time, while...
Retailers and their suppliers are having a tough time in the UK right now. A string of major security breaches tied to ransomware actors has left s...
Remember shadow IT? It has a disruptive new sibling: shadow AI. As employees warm to the time-saving capabilities of generative AI models, theyR...
More than five years after the EU General Data Protection Regulation (GDPR) came into force, the global privacy regulatory landscape is still evolv...
NIST recently announced plans to refresh its privacy framework and make it more of an organic offering and less static. Does this benefit practitio...
The first half of this year has not been a happy one for Oracle or its customers. The company has suffered from two serious data breaches. This is ...
The road to cyber resilience for UK critical infrastructure (CNI) has been a long and winding one. The government’s NIS Regulations 2018 is w...
The US government’s Cybersecurity and Infrastructure Security Agency (CISA) might not have been first on the chopping block when the Trump ad...
Everyone’s feeling more worried about geopolitical risk these days. That’s due largely to the chaos engulfing Washington, although glob...