OT Risk Could Be a $330bn Problem: How Do We Solve It?
Business leaders neglect operational technology (OT) risk at their peril. These are the systems that power some of the UK’s most critical national ...

ISMS.online Blog
Keeping you up-to-date on the world of information security and compliance.
Business leaders neglect operational technology (OT) risk at their peril. These are the systems that power some of the UK’s most critical national ...
The SharePoint exploit was used on high-profile victims including the US National Nuclear Security Administration, the Department of Homeland Secur...
The EU AI Act’s first provisions, such as those on prohibited AI practices, took effect in February 2025. A phased rollout of requirements continue...
The Online Safety Act (OSA) is one of the longest and most complex laws on the UK’s statute books. It’s also one of the most controversial, contain...
We’re delighted to share that IO has been named a Leader in the G2 Grid® Reports for Fall 2025. This quarter, ISMS.online achieved ten badges in th...
We’re delighted to share that IO has been named a Leader in the G2 Grid® Reports for Fall 2025. This quarter, ISMS.online achieved ten badges in th...
The White House unveiled a sweeping AI action plan in July that reshapes America’s approach to governing AI. It’s a huge pivot from the...
A recent Qantas data breach compromising the personal information of 5.7 million customers has highlighted the ongoing cybersecurity risk that thir...
Get a monthly round-up of all the information, privacy and cyber security news direct to your inbox.
In cybersecurity, we talk a lot about risk, assessing it, prioritising it, and mitigating it. We measure maturity in frameworks, implement controls...
Security and compliance teams had a busy start to 2025. Sandwiched between the deadline for member states to implement NIS 2 into local law and the...
What do Marks & Spencer and Jaguar Land Rover (JLR) have in common? They both suffered significant ransomware breaches this year after threat a...
Support for Windows 10 officially ends on October 14th. As the end-of-life deadline draws nearer, organisations that haven’t already made the switc...
At ISMS.online, we’ve always believed that compliance shouldn’t feel like a constant uphill battle. It should be structured, achievable...
Phishing remains among the most common cyberattacks used by threat actors. Most businesses have seen it in action: emails requesting an ‘urgent tas...
Consumers often see most cyber attacks as something that happens to other people, until it affects them directly. The theft of email addresses and ...
Researchers have detailed a flaw in Microsoft 365’s Copilot, “EchoLeak”, which could allow attackers to exfiltrate sensitive comp...
At ISMS.online, we believe compliance should work with your business, not against it. That’s why we continue to develop features that simplify day-...