The place for security news and views

Welcome to the Bulletproof blog. This is where you'll find us talking about all things infosec, whatever happens to be on our mind. We cover a range of topics, so no matter what your interest in cyber security, you'll find a blog post to suit you.

Understanding the importance of data retention

Helping businesses understand the importance of data retention, how long businesses can hold onto personal data and for what purpose.

By Rebecca Bada on 19/05/2022

Biggest Challenges to Implementing ISO 27001

By Nicky Whiting on 12/05/2022

A CISO's Guide for Measuring your Security

By Eze Adighibe on 20/04/2022

Consent versus legitimate interest - know the difference

By Rebecca Bada on 18/04/2022

5 simple tips to improve your password management

By Emma Dockerill on 16/04/2022

Customer Spotlight - Civo

By Rajnish Ghaly on 14/04/2022

Bcc for Email and Bcc Incidents Explained

By Richard Bradley on 25/03/2022

Research reveals the extent of hackers using default credentials to target businesses

By Brian Wagner on 15/03/2022

Understanding the business value of a virtual CISO

By Nicky Whiting on 14/03/2022

#BreakTheBias on International Women's Day

By Rajnish Ghaly on 08/03/2022

ISO 27001 compliance: What you need to know in 2022

By Oliver Pinson-Roxburgh on 07/03/2022

Cyber security advice during the Ukraine conflict

By Oliver Pinson-Roxburgh on 02/03/2022

How is COVID-19 continuing to impact the cyber security sector?

By Oliver Pinson-Roxburgh on 28/02/2022

Key cyber security tips to secure your business in 2022

By Oliver Pinson-Roxburgh on 21/02/2022

Employee Monitoring - Who’s watching you?

By Richard Bradley on 18/02/2022

Press Release: Businesses Leave Critical Vulnerabilities Unpatched

By Oliver Pinson-Roxburgh on 15/02/2022

What is CHECK and CREST penetration testing?

By Kieran Roberts on 08/02/2022

Economy of hacking: how do hackers make money?

By Joseph Poppy on 04/02/2022

Cloud computing: biggest risks and best practices

By Kieran Roberts on 01/02/2022

What are cookies and how to lawfully use them

By Richard Bradley on 24/01/2022

Cyber Essentials Update 2022 - what you need to know

By Nicky Whiting on 21/01/2022

Being Aware Of The 6 Different Types Of Hackers

By Kieran Roberts on 14/01/2022

Partner of the Year Awards 2021

By Andrew Mitchell on 07/01/2022

Log4j detecting an attack and compromise in logs

By Brian Wagner on 03/12/2021

Top 5 Most Common Application Vulnerabilities in the UK

By Oliver Pinson-Roxburgh on 22/11/2021

What are Data Processing Agreements?

By Neil Barnes on 19/11/2021

What is supplier due diligence?

By Rebecca Bada on 17/12/2021

Why is Social Engineering so Effective?

By Kieran Roberts on 15/11/2021

Social Engineering Attacks and How to Prevent Them

By Kieran Roberts on 08/11/2021

What is Data Protection by Design?

By Ali Ahsan on 22/10/2021

The future of UK international data transfers

By Ali Ahsan on 24/09/2021

A day in the life of our penetration testers

By Emma Dockerill on 23/09/2021

Data protection and the age-appropriate design code

By Adindu Nwichi on 20/08/2021

5 reasons why you need cyber essentials

By Emma Dockerill on 13/08/2021

Meet our penetration testers

By Rebecca Bada on 29/07/2021

Security measures for data protection

By Rebecca Bada on 16/07/2021

EU representation – what UK businesses need to know

By Nicky Whiting on 28/06/2021

Penetration testing: a how-to guide for enterprises

By Oliver Pinson-Roxburgh on 11/06/2021

EDR - Endpoint Detection and Response Guide

By Joe A. J. Beaumont on 08/06/2021

Reporting a GDPR data breach

By Rebecca Bada on 21/05/2021

Detecting and Countering Inside Cyber Security Threats

By Emma Dockerill on 18/05/2021

Why SMEs should care about cyber security

By Joe A. J. Beaumont on 14/05/2021

The Cost Of ISO & GDPR Non-Compliance

By Joe A. J. Beaumont on 10/05/2021

Spear Phishing - What It Is And How To Prevent It

By Joe A. J. Beaumont on 05/05/2021

How to manage data subject access requests (DSARS)

By Vera Ishani on 23/04/2021

Understanding IT security

By Joe A. J. Beaumont on 09/04/2021

NIDS - A Guide To Network Intrusion Detection Systems

By Joe A. J. Beaumont on 09/04/2021

What is PECR and when does it apply?

By Rebecca Bada on 19/03/2021

HIDS – A Guide To Host Based Intrusion Detection Systems

By Joe A. J. Beaumont on 12/03/2021

Advocating for women in tech this international women’s day

By Emma Dockerill on 08/03/2021

What matters most: vunlerability scans or pen tests?

By Joe A. J. Beaumont on 26/02/2021

What Is a GDPR Breach?

By Joe A. J. Beaumont on 25/02/2021

Brexit update: what the trade deal means for UK businesses

By Nicky Whiting on 19/02/2021

Biggest Data Breaches & What We Can Learn From Them

By Emma Dockerill on 19/02/2021

Intrusion Detection System - A Guide to IDS

By Emma Dockerill on 12/02/2021

Biggest cyber attacks of 2020 & what we can learn from them

By Joe A. J. Beaumont on 05/02/2021

Meet the people behind your compliance

By Emma Dockerill on 27/01/2021

5 reasons you need to pen test in 2021

By Joe A. J. Beaumont on 22/01/2021

Sunburst - what you need to know

By Andy Smith on 22/12/2020

Four things hackers don’t want you to know

By Joe A. J. Beaumont on 21/12/2020

2020 data breaches: lessons from our DPOs

By Nicky Whiting on 11/12/2020

Top cyber security stats you need to know for 2021

By Oliver Pinson-Roxburgh on 26/11/2020

Gamifying cyber security training

By Emma Dockerill on 20/11/2020

What is ethical hacking & how can it secure your business?

By Kieran Roberts on 02/11/2020

Everything you need to know about DPO for schools

By Luke Peach on 18/09/2020

Getting cyber security buy-in from the board

By Joe Beaumont on 21/08/2020

The importance of cyber training for remote workers

By Oliver Pinson-Roxburgh on 17/07/2020

How to secure your remote workforce

By Joe Beaumont on 03/07/2020

GDPR 2 years on – key takeaways and lessons learnt

By Joe Beaumont on 26/06/2020

Understanding the role and responsibilities of the DPO

By Nicky Whiting on 15/05/2020

Why cyber security is even more important in the wake of Covid-19

By Joe Beaumont on 27/03/2020

The rush to secure remote working

By Oliver Pinson-Roxburgh on 17/03/2020

Women in cyber – an open letter

By Katie Howe on 06/03/2020

15 must-know cyber security stats to inform your 2020 security strategy

By Joseph Poppy on 17/12/2019

Bulletproof goes to space

By Joseph Poppy on 29/11/2019

What is a data protection officer?

By Joseph Poppy on 07/11/2019

Player ‘cyber criminal’ has entered the game

By Joseph Poppy on 06/09/2019

What is the cyber kill chain?

By Joseph Poppy on 21/08/2019

Working at Bulletproof

By Joseph Poppy 19/07/2019

ICO finally bears its teeth

By Joseph Poppy 08/07/2019

Ryuk is Coming

By Joseph Poppy 05/07/2019

The dangers of public Wi-Fi

By Joseph Poppy 21/06/2019

Cyber security isn’t magic... Or is it?

By Joe Beaumont 07/06/19

Bulletproof’s international man of compliance

By Luke Peach on 10/05/2019

Fantastic breaches and where to find them

By Luke Peach on 12/04/2019

What happens when hackers get physical?

By Joe A.J. Beaumont on 29/03/2019

Bot or not? It’s about to become a lot harder to tell.

By Joseph Poppy on 15/03/2019

The concerning cyber security prognosis for the healthcare industry

By Joseph Poppy on 15/02/2019

There’s a shortage of women in cyber security, and that’s a problem

By Joseph Poppy on 01/02/2019

Corporate or start up: who’s most at risk?

By Joseph Poppy on 14/12/2018

Red team testing: hacking and lying your way to data

By Tom Wyatt on 30/11/2018

What does a compliance consultant do?

By Luke Peach on 15/10/2018

Five top tips for booking a penetration test

By Joseph Poppy on 05/10/2018

Cyber security and AI: nothing to fear?

By Joseph Poppy on 21/09/2018

To phish or not to phish?

By Joseph Poppy on 17/09/2018

Compliance is not security

By Oliver Pinson-Roxburgh on 07/09/2018

Appointing a DPO

By Luke Peach on 17/08/2018

What happened when we hacked an expo?

By Tom Wyatt on 06/07/2018

How long is your dwell time?

By Oliver Pinson-Roxburgh on 28/06/2018

Our experts are the ones to trust when it comes to your cyber security

CREST approvedCREST approvedCREST approved
Payment card industry data security standardPayment card industry data security standardPayment card industry data security standard
ISO 27001 certifiedISO 27001 certifiedISO 27001 certified
ISO 9001 certifiedISO 9001 certifiedISO 9001 certified
Government G-Cloud supplierGovernment G-Cloud supplierGovernment G-Cloud supplier
Crown commercial service supplierCrown commercial service supplierCrown commercial service supplier
Cyber EssentialsCyber EssentialsCyber Essentials
Cyber Essentials PlusCyber Essentials PlusCyber Essentials Plus

Get a quote today

If you are interested in our services, get a free, no obligation quote today by filling out the form below.

For more information about how we collect, process and retain your personal data, please see our privacy policy.