Hertfordshire, United Kingdom
May 25, 2023   |  By Joe A. J. Beaumont
Our experienced virtual CISOs give you senior strategy support on and as-and-when basis. Find out more.
May 23, 2023   |  By Richard Bradley
Despite the GDPR routinely (and wrongly) being seen as an encumbrance, many of its requirements make sense for sound business and management reasons. For example, the requirement to maintain Records of Processing Activities (RoPA) under Article 30 can reduce time needed from business analysts when scoping projects. Data Protection Impact Assessments (DPIAs), reduce time misspent on projects which are not appropriate, legally viable, or necessary.
May 16, 2023   |  By Eze Adighibe
Access senior security strategy on a flexible retainer basis. Chat with our friendly consultants and get started today. Get started today.
Apr 24, 2023   |  By Rebecca Bada
This blog is based on insight from our 2023 State of Cyber Security report. This month sees GDPR celebrate its 5th birthday, and during that time it’s stayed more-or-less the same. With unchanging rules and half a decade of time to get data protection things in order, you might think that the need for GDPR consultancy is dwindling. However, as we showed in our 2023 State of Cyber Security report, that’s sadly not the case.
Apr 3, 2023   |  By Jamie Testouri
Cyber Essentials, often just called CE, has been around for nearly a whole decade, and it’s still as popular as ever. The trick to its endurance is the yearly changes that keep it relevant. IASME, the governing body who work with the National Cyber Security Centre (NCSC) to maintain the standard, typically update Cyber Essentials every April, give or take a month, and 2023 is no different.
Mar 31, 2023   |  By Joe A. J. Beaumont
Being untraceable, untouchable, and ungovernable is a key part of the myth and mystique of ‘hackers’. Sure enough, the ability to hide has always been a central part of the hackers’ MO in both the physical and digital world. At Bulletproof, we’re no strangers to the insidious nature of hackers.
Mar 23, 2023   |  By Joe A. J. Beaumont
Security often feels like an uphill battle. Let’s say your organisation has done the basics – you’ve got Cyber Essentials certification, and also started regular penetration testing. Firstly, congratulations – you’re well on your way to stopping the majority of opportunistic attacks. But after the pen test comes the report, and for business who aren’t prepared, a whole new problem emerges: how do you tackle the remediations effectively?
Feb 28, 2023   |  By Luke Peach
Every business that collects personal data via a website, app, or even via the phone/post will find that they need the skills and expertise of a Data Protection Officer at some point to ensure safe and confidential data processing. But what is a DPO exactly? Do you really need one? And what if you don’t want to hire someone full time? Read on to find out more about the roles and responsibilities of the DPO and when to hire one to secure your data.
Feb 1, 2023   |  By Nicky Whiting
Information security is a major concern for many businesses for two reasons. Firstly is persistent threat of cyber attacks and data breaches. That’s why strong information security is a requirement to ensure the security of business and personal data. Secondly, it’s a key business enabler, with a push in recent times for all parts of a supply chain to become ISO 27001 certified.
Nov 11, 2022   |  By Nicky Whiting
In October 2022, ISO 27001 introduced new changes. The internationally recognised standard on how to manage your information security was first launched in 2005 and underwent its last update in 2013. Since then, new technologies have emerged to dominate the business landscape, such as cloud computing, which has brought new security challenges. It’s estimated that global cybercrime is expected to grow by 15% per year, totaling a staggering $10.5 trillion by 2025.
Sep 27, 2018   |  By Bulletproof
Confused about PCI compliance? Get a clear understanding of this much misunderstood standard with our Clarity On PCI Compliance white paper. This is the first in our 'Security First' series of white papers and provides an illustrated insight into the world of PCI DSS compliance. Inside we explain the requirements, dispel the myths and give you top tips for saving time and effort.
Sep 1, 2018   |  By Bulletproof
This Security First white paper will help businesses understand all aspects of penetration testing services, from planning and managing through to getting real value and benefit from the results. This whitepaper is not a guide for practitioners, but instead is aimed at people who need to procure, plan, and manage the lifecycle of a penetration testing project.
Aug 1, 2018   |  By Bulletproof
This white paper will provide you with a high-level understanding of GDPR's strategic aims and the challenges these present to UK businesses. In addition, we'll present helpful tips for interpreting, implementing and maintaining the new legislation and your approach to managing personal data.

We are your best defence from cyber threats. We are Bulletproof.

Here at Bulletproof, security's in our DNA. Our information and cyber security services are the best way to stay ahead of the hackers, take control of your infrastructure and protect your business-critical data.

Investing in the future by securing today: Employees are the lifeblood of a company, and we are no exception. We’re proud to say our staff are passionate and experienced in all areas of information security – and certified by the likes of CREST and Tigerscheme. We also have a world-class infrastructure, with two PCI v3.2 compliant data centres and powerful SIEM software that was designed in-house.

24/7 Security Operations Centre: One of the major factors to our success is our UK Security Operations Centre (SOC). This is an in-house facility, staffed every hour day and night by our cyber security gurus. The SOC acts as a command station for all our security operations and, in the case of our Managed SIEM and Threat Protection services, are always geared up to deploy full incident management procedures, according to pre-defined runbooks, within moments of a security event being detected.

Trained. Experienced. Certified. That’s Bulletproof.