Trends in Security and Compliance: Five Takeaways From Infosecurity Europe 2024
Every year, the cybersecurity industry comes together at Europe’s largest industry event: Infosecurity Europe. The scale of the show—at Londo...

ISMS.online Blog
Keeping you up-to-date on the world of information security and compliance.
Every year, the cybersecurity industry comes together at Europe’s largest industry event: Infosecurity Europe. The scale of the show—at Londo...
We’re delighted to share that ISMS.online has been named a Leader in the G2 Grid® Reports for Summer 2024. G2 is a leading peer-to-peer review site...
Artificial intelligence (AI)-powered deepfake technology is not a new phenomenon. The term ‘deepfake’ has been used to describe synthetic media sin...
In April, the government told us that half of UK businesses had suffered a breach over the previous 12 months, rising to even higher for medium (70...
Risk Assessment in Information Security Risk management plays a vital role in any organisation’s information security posture. A proactive approach...
At the RSA Conference on May 6, the US unveiled a strategy for building a stronger, more secure digital ecosystem across the world. The United Stat...
The UK’s universities are being assailed from all sides. A report last year revealed that dozens of institutions had accepted at least £122m-156m f...
I am pleased to present the findings from our latest State of Information Security Report, conducted in partnership with independent market researc...
Introduction to ISO 27001:2022 Annex A ISO 27001:2022 is an international information security standard implemented through an information security...
Scores of technology vendors have signed up to a US government-backed Secure by Design pledge. But will the commitment mark a break with the past a...
The past year has been one of AI’s biggest since scientists first proposed the concept in the late 1940s. AI vendors have continued to innova...
There’s more computing power in a single smartphone today than was available to mission control during the Apollo 11 moon landing. That’s the kind ...
The National Institute of Standards and Technology (NIST) is in a bind, and one that has serious implications for cybersecurity teams worldwide. Th...
Regulatory compliance is a growing priority for cybersecurity teams, as they face mounting cybersecurity risks, increase their use of technology, a...
Industry trends come and go. but one staple of the cybersecurity landscape over the past 17 years has been the Verizon Data Breach Investigations R...
There’s a clause in the California Consumer Protection Act (CCPA) on data minimization that the Rolling Stones could have written. It says th...
Operational Technology (OT) systems automatically monitor and control processes and equipment running everything from power plants to smart hospita...
Company number: 04922343
Nile House, Nile Street, Brighton, England, BN1 1HW