Hacking cyber security for GDPR in three steps

ISSA-UK members have collaborated and got straight to the heart of GDPR to identify the five hidden articles relating to technology. Andy Burston explains

Data sharing key in response to terrorism

Weynand Haitjema explores the importance of planning emergency responses and the role of information sharing in mitigating the terrorist threat

Roderick Jones Interview - assessing digital crime

Counter Terror Business interviews Roderick Jones about the current state of UK cyber security in the face of terrorism

At a time when international cyber-security is being continuously tested, do we have the skills and knowledge to counter such threats? Nigel Jones from the newly-formed Global Institute of Cyber, Intelligence and Security examines the issue

With the amount of data, both structured and unstructured, being created on a daily basis, it’s increasingly important to be able to understand the value and importance of that data.

Most businesses consider doing due diligence on their supply chain, but does that include suppliers of Data Warehousing? asks Chris Phillips, of the International Protect and Prepare Security Office

Supplier Profiles

Me and You Education

Me and You Education is a collaboration between two companies with divergent backgrounds that provides deep insights into the murky and complex world of Counter Terrorism.