The place for security news and views
Welcome to the Bulletproof blog. This is where you'll find us talking about all things infosec, whatever happens to be on our mind. We cover a range of topics, so no matter what your interest in cyber security, you'll find a blog post to suit you.
Understanding the importance of data retention
Helping businesses understand the importance of data retention, how long businesses can hold onto personal data and for what purpose.
By Rebecca Bada on 19/05/2022
Biggest Challenges to Implementing ISO 27001
By Nicky Whiting on 12/05/2022
A CISO's Guide for Measuring your Security
By Eze Adighibe on 20/04/2022
Consent versus legitimate interest - know the difference
By Rebecca Bada on 18/04/2022
5 simple tips to improve your password management
By Emma Dockerill on 16/04/2022
Customer Spotlight - Civo
By Rajnish Ghaly on 14/04/2022
Bcc for Email and Bcc Incidents Explained
By Richard Bradley on 25/03/2022
Research reveals the extent of hackers using default credentials to target businesses
By Brian Wagner on 15/03/2022
Understanding the business value of a virtual CISO
By Nicky Whiting on 14/03/2022
#BreakTheBias on International Women's Day
By Rajnish Ghaly on 08/03/2022
ISO 27001 compliance: What you need to know in 2022
By Oliver Pinson-Roxburgh on 07/03/2022
Cyber security advice during the Ukraine conflict
By Oliver Pinson-Roxburgh on 02/03/2022
How is COVID-19 continuing to impact the cyber security sector?
By Oliver Pinson-Roxburgh on 28/02/2022
Key cyber security tips to secure your business in 2022
By Oliver Pinson-Roxburgh on 21/02/2022
Employee Monitoring - Who’s watching you?
By Richard Bradley on 18/02/2022
Press Release: Businesses Leave Critical Vulnerabilities Unpatched
By Oliver Pinson-Roxburgh on 15/02/2022
What is CHECK and CREST penetration testing?
By Kieran Roberts on 08/02/2022
Economy of hacking: how do hackers make money?
By Joseph Poppy on 04/02/2022
Cloud computing: biggest risks and best practices
By Kieran Roberts on 01/02/2022
What are cookies and how to lawfully use them
By Richard Bradley on 24/01/2022
Cyber Essentials Update 2022 - what you need to know
By Nicky Whiting on 21/01/2022
Being Aware Of The 6 Different Types Of Hackers
By Kieran Roberts on 14/01/2022
Partner of the Year Awards 2021
By Andrew Mitchell on 07/01/2022
Log4j detecting an attack and compromise in logs
By Brian Wagner on 03/12/2021
Top 5 Most Common Application Vulnerabilities in the UK
By Oliver Pinson-Roxburgh on 22/11/2021
What are Data Processing Agreements?
By Neil Barnes on 19/11/2021
What is supplier due diligence?
By Rebecca Bada on 17/12/2021
Why is Social Engineering so Effective?
By Kieran Roberts on 15/11/2021
Social Engineering Attacks and How to Prevent Them
By Kieran Roberts on 08/11/2021
What is Data Protection by Design?
By Ali Ahsan on 22/10/2021
The future of UK international data transfers
By Ali Ahsan on 24/09/2021
A day in the life of our penetration testers
By Emma Dockerill on 23/09/2021
Data protection and the age-appropriate design code
By Adindu Nwichi on 20/08/2021
5 reasons why you need cyber essentials
By Emma Dockerill on 13/08/2021
Meet our penetration testers
By Rebecca Bada on 29/07/2021
Security measures for data protection
By Rebecca Bada on 16/07/2021
EU representation – what UK businesses need to know
By Nicky Whiting on 28/06/2021
Penetration testing: a how-to guide for enterprises
By Oliver Pinson-Roxburgh on 11/06/2021
EDR - Endpoint Detection and Response Guide
By Joe A. J. Beaumont on 08/06/2021
Reporting a GDPR data breach
By Rebecca Bada on 21/05/2021
Detecting and Countering Inside Cyber Security Threats
By Emma Dockerill on 18/05/2021
Why SMEs should care about cyber security
By Joe A. J. Beaumont on 14/05/2021
The Cost Of ISO & GDPR Non-Compliance
By Joe A. J. Beaumont on 10/05/2021
Spear Phishing - What It Is And How To Prevent It
By Joe A. J. Beaumont on 05/05/2021
How to manage data subject access requests (DSARS)
By Vera Ishani on 23/04/2021
Understanding IT security
By Joe A. J. Beaumont on 09/04/2021
NIDS - A Guide To Network Intrusion Detection Systems
By Joe A. J. Beaumont on 09/04/2021
What is PECR and when does it apply?
By Rebecca Bada on 19/03/2021
HIDS – A Guide To Host Based Intrusion Detection Systems
By Joe A. J. Beaumont on 12/03/2021
Advocating for women in tech this international women’s day
By Emma Dockerill on 08/03/2021
What matters most: vunlerability scans or pen tests?
By Joe A. J. Beaumont on 26/02/2021
What Is a GDPR Breach?
By Joe A. J. Beaumont on 25/02/2021
Brexit update: what the trade deal means for UK businesses
By Nicky Whiting on 19/02/2021
Biggest Data Breaches & What We Can Learn From Them
By Emma Dockerill on 19/02/2021
Intrusion Detection System - A Guide to IDS
By Emma Dockerill on 12/02/2021
Biggest cyber attacks of 2020 & what we can learn from them
By Joe A. J. Beaumont on 05/02/2021
Meet the people behind your compliance
By Emma Dockerill on 27/01/2021
5 reasons you need to pen test in 2021
By Joe A. J. Beaumont on 22/01/2021
Sunburst - what you need to know
By Andy Smith on 22/12/2020
Four things hackers don’t want you to know
By Joe A. J. Beaumont on 21/12/2020
2020 data breaches: lessons from our DPOs
By Nicky Whiting on 11/12/2020
Top cyber security stats you need to know for 2021
By Oliver Pinson-Roxburgh on 26/11/2020
Gamifying cyber security training
By Emma Dockerill on 20/11/2020
What is ethical hacking & how can it secure your business?
By Kieran Roberts on 02/11/2020
Everything you need to know about DPO for schools
By Luke Peach on 18/09/2020
Getting cyber security buy-in from the board
By Joe Beaumont on 21/08/2020
The importance of cyber training for remote workers
By Oliver Pinson-Roxburgh on 17/07/2020
How to secure your remote workforce
By Joe Beaumont on 03/07/2020
GDPR 2 years on – key takeaways and lessons learnt
By Joe Beaumont on 26/06/2020
Understanding the role and responsibilities of the DPO
By Nicky Whiting on 15/05/2020
Why cyber security is even more important in the wake of Covid-19
By Joe Beaumont on 27/03/2020
The rush to secure remote working
By Oliver Pinson-Roxburgh on 17/03/2020
Women in cyber – an open letter
By Katie Howe on 06/03/2020
15 must-know cyber security stats to inform your 2020 security strategy
By Joseph Poppy on 17/12/2019
Bulletproof goes to space
By Joseph Poppy on 29/11/2019
What is a data protection officer?
By Joseph Poppy on 07/11/2019
Player ‘cyber criminal’ has entered the game
By Joseph Poppy on 06/09/2019
What is the cyber kill chain?
By Joseph Poppy on 21/08/2019
Working at Bulletproof
By Joseph Poppy 19/07/2019
ICO finally bears its teeth
By Joseph Poppy 08/07/2019
Ryuk is Coming
By Joseph Poppy 05/07/2019
The dangers of public Wi-Fi
By Joseph Poppy 21/06/2019
Cyber security isn’t magic... Or is it?
By Joe Beaumont 07/06/19
Bulletproof’s international man of compliance
By Luke Peach on 10/05/2019
Fantastic breaches and where to find them
By Luke Peach on 12/04/2019
What happens when hackers get physical?
By Joe A.J. Beaumont on 29/03/2019
Bot or not? It’s about to become a lot harder to tell.
By Joseph Poppy on 15/03/2019
The concerning cyber security prognosis for the healthcare industry
By Joseph Poppy on 15/02/2019
There’s a shortage of women in cyber security, and that’s a problem
By Joseph Poppy on 01/02/2019
Corporate or start up: who’s most at risk?
By Joseph Poppy on 14/12/2018
Red team testing: hacking and lying your way to data
By Tom Wyatt on 30/11/2018
What does a compliance consultant do?
By Luke Peach on 15/10/2018
Five top tips for booking a penetration test
By Joseph Poppy on 05/10/2018
Cyber security and AI: nothing to fear?
By Joseph Poppy on 21/09/2018
To phish or not to phish?
By Joseph Poppy on 17/09/2018
Compliance is not security
By Oliver Pinson-Roxburgh on 07/09/2018
Appointing a DPO
By Luke Peach on 17/08/2018
What happened when we hacked an expo?
By Tom Wyatt on 06/07/2018
How long is your dwell time?
By Oliver Pinson-Roxburgh on 28/06/2018
Our experts are the ones to trust when it comes to your cyber security
Get a quote today
If you are interested in our services, get a free, no obligation quote today by filling out the form below.