Don’t Be an April Fool. Every year on the 31st of March, the global technology community pauses to ask one question: if everything disappeared tomorrow, would you survive? Most...
There is a telling irony at the centre of modern data protection. The organisations spending the most on privacy technology are often the ones furthest from genuine compliance. They...
Written by Zak Layton Elliott, Cyber Security Analyst Introducing Threat Intelligence Cyber Threat Intelligence or CTI for short, is a tool and process that can be utilised by organisations...
The Court of Appeal’s latest ruling on the DSG Retail cyber-attack should be read as a decisive statement about responsibility in the digital age. By backing the Information Commissioner’s...
UK data protection reform has entered a new phase, bringing with it a pace of change not previously seen in the UK. Recent reforms taking effect at short notice show a clear...
With Privacy Day approaching, organisations are looking ahead to a year that increasingly resembles a geopolitical and commercial chessboard for data privacy. By 2026, the global privacy landscape has...
Three New U.S. State Privacy Laws Take Effect: What Changed on 1 January 2026 On 1 January 2026, three additional U.S. state-level comprehensive privacy laws came into force: Indiana,...
Executive Summary A critical security vulnerability, identified as CVE-2025-14346, affects all versions of WHILL Model C2 Electric Wheelchairs and Model F Power Chairs. The flaw, rated with a CVSS...
If there is one enduring lesson that we’ve taken away from the state of cybersecurity of late 2025, it is that your data security is only as strong as...
