The place for security news and views

Welcome to the Bulletproof blog. This is where you’ll find us talking about all things infosec, whatever happens to be on our mind. We cover a range of topics, so no matter what your interest in cyber security, you’ll find a blog post to suit you.

Understanding IT Security

By Joe A. J. Beaumont on 09/04/2021

What is PECR and when does it apply?

By Rebecca Bada on 19/03/2021

Advocating for women in tech this International Women’s Day

By Emma Dockerill on 08/03/2021

What matters most: VA scans or pen tests

By Joe A. J. Beaumont on 25/02/2021

Brexit Update: What The Trade Deal Means for UK Businesses

By Nicky Whiting on 19/02/2021

Biggest Cyber Attacks of 2020 & What We Can Learn From Them

By Joe A. J. Beaumont on 05/02/2021

Meet the people behind your compliance

By Emma Dockerill on 27/01/2021

5 reasons you need to pen test in 2021

By Joe A. J. Beaumont on 22/01/2021

Sunburst - what you need to know

By Andy Smith on 22/12/2020

Four things hackers don’t want you to know

By Joe A. J. Beaumont on 21/12/2020

2020 Data Breaches: Lessons from our DPOs

By Nicky Whiting on 11/12/2020

Top cyber security stats you need to know for 2021

By Oliver Pinson-Roxburgh on 26/11/2020

Gamifying cyber security training

By Emma Dockerill on 20/11/2020

What Is Ethical Hacking & How It Can Secure Your Business

By Kieran Roberts on 02/11/2020

Everything you need to know about DPO for schools

By Luke Peach on 18/09/2020

Getting cyber security buy-in from the board

By Joe Beaumont on 21/08/2020

The importance of cyber training for remote workers

By Oliver Pinson-Roxburgh on 17/07/2020

How to secure your remote workforce

By Joe Beaumont on 03/07/2020

GDPR 2 years on – key takeaways and lessons learnt

By Joe Beaumont on 26/06/2020

Everything you need to know about a DPO

By Nicky Whiting on 15/05/2020

Why cyber security is even more important because of covid-19

By Joe Beaumont on 27/03/2020

The Rush to Secure Remote Working

By Oliver Pinson-Roxburgh on 17/03/2020

Women in Cyber – An Open Letter

By Katie Howe on 06/03/2020

15 must-know cyber security stats to inform your 2020 security strategy

By Joseph Poppy on 17/12/2019

Bulletproof goes to space

By Joseph Poppy on 29/11/2019

Data Protection Officer (DPO)

By Joseph Poppy on 07/11/2019

Understanding Cyber Essentials

By Joseph Poppy on 04/10/2019

Gamers risk getting played by hackers

By Joseph Poppy on 06/09/2019

What is The Cyber Kill Chain?

By Joseph Poppy on 21/08/2019

Working at Bulletproof

By Joseph Poppy 19/07/2019

ICO finally bears its teeth

By Joseph Poppy 08/07/2019

Ryuk is Coming

By Joseph Poppy 05/07/2019

The dangers of public Wi-Fi

By Joseph Poppy 21/06/2019

Cyber security isn't magic... Or is it?

By Joe Beaumont 07/06/19

Bulletproof’s international man of compliance

By Luke Peach on 10/05/2019

Fantastic breaches and where to find them

By Luke Peach on 12/04/2019

What happens when hackers get physical?

By Joe A.J. Beaumont on 29/03/2019

Bot or not? It's about to become a lot harder to tell.

By Joseph Poppy on 15/03/2019

The Economy of Hacking: How Does a Hacker Make Money?

By Joseph Poppy on 01/03/2019

The concerning cyber security prognosis for the healthcare industry

By Joseph Poppy on 15/02/2019

There’s a shortage of women in cyber security, and that’s a problem

By Joseph Poppy on 01/02/2019

Corporate or start up: who’s most at risk?

By Joseph Poppy on 14/12/2018

Red team testing: hacking and lying your way to data

By Tom Wyatt on 30/11/2018

Vulnerability scans vs Penetration tests

By Joseph Poppy on 16/11/2018

What does a compliance consultant do?

By Luke Peach on 15/10/2018

Five top tips for booking a penetration test

By Joseph Poppy on 05/10/2018

Cyber security and AI: nothing to fear?

By Joseph Poppy on 21/09/2018

To phish or not to phish?

By Joseph Poppy on 17/09/2018

Compliance is not security

By Oli Pinson-Roxburgh on 07/09/2018

Appointing a DPO

By Luke Peach on 17/08/2018

What happened when we hacked an expo?

By Tom Wyatt on 06/07/2018

How long is your dwell time?

By Oli Pinson-Roxburgh on 28/06/2018

Our experts are the ones to trust when it comes to your cyber security

  • Bulletproof are CREST approved

    CREST approved

  • Bulletproof are ISO 27001 and 9001 certified

    ISO 27001 and 9001 certified

  • Bulletproof are Tigerscheme qualified testers

    Tigerscheme qualified testers

  • Bulletproof are a PCI DSS v3.2 Level 1 service provider

    PCI DSS v3.2 Level 1
    service provider

  • Bulletproof have 24/7 on-site Security Operations Centre

    24/7 on-site Security
    Operations Centre

Get a quote today

If you’re interested in our services, get a free, no obligation quote today by filling out the form below.

By submitting this form, I agree to the Bulletproof privacy policy.