The place for security news and views

Welcome to the Bulletproof blog. This is where you’ll find us talking about all things infosec, whatever happens to be on our mind. We cover a range of topics, so no matter what your interest in cyber security, you’ll find a blog post to suit you.

What is Data Protection by Design?

By Ali Ahsan on 22/10/2021

The future of UK international data transfers

By Ali Ahsan on 24/09/2021

A day in the life of our penetration testers

By Emma Dockerill on 23/09/2021

Data protection and the Age-Appropriate Design Code

By Adindu Nwichi on 20/08/2021

5 reasons why you need Cyber Essentials

By Emma Dockerill on 13/08/2021

Security measures for data protection

By Rebecca Bada on 16/07/2021

EU representation – what UK businesses need to know

By Nicky Whiting on 28/06/2021

Penetration Testing: A How-to Guide for Enterprises

By Oliver Pinson-Roxburgh on 11/06/2021

Reporting a GDPR data breach

By Rebecca Bada on 21/05/2021

Why SMEs should Care About Cyber Security

By Joe A. J. Beaumont on 14/05/2021

How to manage data subject access requests (DSARs)

By Vera Ishani on 23/04/2021

Understanding IT Security

By Joe A. J. Beaumont on 09/04/2021

What is PECR and when does it apply?

By Rebecca Bada on 19/03/2021

Advocating for women in tech this International Women’s Day

By Emma Dockerill on 08/03/2021

Brexit Update: What The Trade Deal Means for UK Businesses

By Nicky Whiting on 19/02/2021

Biggest Cyber Attacks of 2020 & What We Can Learn From Them

By Joe A. J. Beaumont on 05/02/2021

Meet the people behind your compliance

By Emma Dockerill on 27/01/2021

5 reasons you need to pen test in 2021

By Joe A. J. Beaumont on 22/01/2021

Sunburst - what you need to know

By Andy Smith on 22/12/2020

Four things hackers don’t want you to know

By Joe A. J. Beaumont on 21/12/2020

2020 Data Breaches: Lessons from our DPOs

By Nicky Whiting on 11/12/2020

Top cyber security stats you need to know for 2021

By Oliver Pinson-Roxburgh on 26/11/2020

Gamifying cyber security training

By Emma Dockerill on 20/11/2020

What Is Ethical Hacking & How It Can Secure Your Business

By Kieran Roberts on 02/11/2020

Everything you need to know about DPO for schools

By Luke Peach on 18/09/2020

Getting cyber security buy-in from the board

By Joe Beaumont on 21/08/2020

The importance of cyber training for remote workers

By Oliver Pinson-Roxburgh on 17/07/2020

How to secure your remote workforce

By Joe Beaumont on 03/07/2020

GDPR 2 years on – key takeaways and lessons learnt

By Joe Beaumont on 26/06/2020

Everything you need to know about a DPO

By Nicky Whiting on 15/05/2020

Why cyber security is even more important because of covid-19

By Joe Beaumont on 27/03/2020

The Rush to Secure Remote Working

By Oliver Pinson-Roxburgh on 17/03/2020

Women in Cyber – An Open Letter

By Katie Howe on 06/03/2020

15 must-know cyber security stats to inform your 2020 security strategy

By Joseph Poppy on 17/12/2019

Bulletproof goes to space

By Joseph Poppy on 29/11/2019

Data Protection Officer (DPO)

By Joseph Poppy on 07/11/2019

Gamers risk getting played by hackers

By Joseph Poppy on 06/09/2019

What is The Cyber Kill Chain?

By Joseph Poppy on 21/08/2019

Working at Bulletproof

By Joseph Poppy 19/07/2019

ICO finally bears its teeth

By Joseph Poppy 08/07/2019

Ryuk is Coming

By Joseph Poppy 05/07/2019

The dangers of public Wi-Fi

By Joseph Poppy 21/06/2019

Cyber security isn't magic... Or is it?

By Joe Beaumont 07/06/19

Bulletproof’s international man of compliance

By Luke Peach on 10/05/2019

Fantastic breaches and where to find them

By Luke Peach on 12/04/2019

What happens when hackers get physical?

By Joe A.J. Beaumont on 29/03/2019

Bot or not? It's about to become a lot harder to tell.

By Joseph Poppy on 15/03/2019

The Economy of Hacking: How Does a Hacker Make Money?

By Joseph Poppy on 01/03/2019

The concerning cyber security prognosis for the healthcare industry

By Joseph Poppy on 15/02/2019

There’s a shortage of women in cyber security, and that’s a problem

By Joseph Poppy on 01/02/2019

Corporate or start up: who’s most at risk?

By Joseph Poppy on 14/12/2018

Red team testing: hacking and lying your way to data

By Tom Wyatt on 30/11/2018

What does a compliance consultant do?

By Luke Peach on 15/10/2018

Five top tips for booking a penetration test

By Joseph Poppy on 05/10/2018

Cyber security and AI: nothing to fear?

By Joseph Poppy on 21/09/2018

To phish or not to phish?

By Joseph Poppy on 17/09/2018

Compliance is not security

By Oli Pinson-Roxburgh on 07/09/2018

Appointing a DPO

By Luke Peach on 17/08/2018

What happened when we hacked an expo?

By Tom Wyatt on 06/07/2018

How long is your dwell time?

By Oli Pinson-Roxburgh on 28/06/2018

Our experts are the ones to trust when it comes to your cyber security

  • Bulletproof are CREST approved

    CREST approved

  • Bulletproof are ISO 27001 and 9001 certified

    ISO 27001 and 9001 certified

  • Bulletproof are Tigerscheme qualified testers

    Tigerscheme qualified testers

  • Bulletproof are a PCI DSS v3.2 Level 1 service provider

    PCI DSS v3.2 Level 1
    service provider

  • Bulletproof have 24/7 on-site Security Operations Centre

    24/7 on-site Security
    Operations Centre

Get a quote today

If you’re interested in our services, get a free, no obligation quote today by filling out the form below.

By submitting this form, I agree to the Bulletproof privacy policy.