<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Relatable Security</title>
    <link>https://relatablesecurity.com/articles/</link>
    <description>Pragmatic, jargon-free security consultancy for human-centred organisations.</description>
    <language>en-gb</language>
    <atom:link href="https://relatablesecurity.com/feed.xml" rel="self" type="application/rss+xml" />
    <lastBuildDate>Wed, 01 Apr 2026 00:00:00 GMT</lastBuildDate>
    <item>
      <title>What are sub-processors, and why should you care?</title>
      <link>https://relatablesecurity.com/articles/what-are-sub-processors-and-why-should-you-care/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/what-are-sub-processors-and-why-should-you-care/</guid>
      <description>The article explains what sub-processors are under UK GDPR, why they matter for managing personal data risk, and what controllers should ask about them.</description>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
      <author>Melissa George</author>
      <category>Compliance</category>
      <category>Risk Management</category>
    </item>
    <item>
      <title>Controller or Processor? Why the distinction matters for data retention</title>
      <link>https://relatablesecurity.com/articles/controller-or-processor-why-the-distinction-matters-for-data-retention/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/controller-or-processor-why-the-distinction-matters-for-data-retention/</guid>
      <description>Explains how the controller/processor distinction under UK GDPR affects who decides data retention periods and carries compliance responsibility.</description>
      <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
      <author>Melissa George</author>
      <category>Compliance</category>
      <category>Governance</category>
    </item>
    <item>
      <title>A Framework for Safe No-Code Development</title>
      <link>https://relatablesecurity.com/articles/a-framework-for-safe-no-code-development/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/a-framework-for-safe-no-code-development/</guid>
      <description>The article outlines a practical oversight framework to help organisations adopt AI-powered no-code development safely while managing security, compliance, and data protection risks.</description>
      <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
      <author>Kit Barker</author>
      <category>AI</category>
      <category>Risk Management</category>
    </item>
    <item>
      <title>&#x27;No code&#x27; does not mean &#x27;No engineer&#x27;</title>
      <link>https://relatablesecurity.com/articles/no-code-does-not-mean-no-engineer/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/no-code-does-not-mean-no-engineer/</guid>
      <description>&#x27;No-code&#x27; AI platforms enable rapid app creation but still need engineering oversight to manage governance, security, and data protection risks.</description>
      <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
      <author>Kit Barker</author>
      <category>Governance</category>
      <category>AI</category>
    </item>
    <item>
      <title>Leave No Trace: Why digital footprints matter</title>
      <link>https://relatablesecurity.com/articles/leave-no-trace-why-digital-footprints-matter/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/leave-no-trace-why-digital-footprints-matter/</guid>
      <description>If you spend any time in the countryside, you’ll likely be familiar with the principle of “leave no trace”. At its heart, this sets out the framework for ensuring that your presence does not cause a problem for others, and if you’re stealth camping it ensures you’re able to go undetected. In the digital landscape</description>
      <pubDate>Tue, 14 Jan 2025 00:00:00 GMT</pubDate>
      <author>Kit Barker</author>
      <category>Security</category>
      <category>Risk Management</category>
    </item>
    <item>
      <title>Beyond Compliance: How Training Drives Business Success</title>
      <link>https://relatablesecurity.com/articles/beyond-compliance-how-training-drives-business-success/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/beyond-compliance-how-training-drives-business-success/</guid>
      <description>It’s a shame that a training policy and personal development plan aren’t standard practices across all businesses. For various reasons, many organisations do not put it at the top of the agenda. However, here’s why they should. The Cost to Businesses Training doesn’t always have to mean expensive courses in external venues. Employees can acquire</description>
      <pubDate>Thu, 09 Jan 2025 00:00:00 GMT</pubDate>
      <author>Melissa George</author>
      <category>Training</category>
    </item>
    <item>
      <title>CAF and DSPT</title>
      <link>https://relatablesecurity.com/articles/caf-and-dspt/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/caf-and-dspt/</guid>
      <description>DSPT submission I know we are only in January, but before you know it we will be seeing new born lambs in fields, daffodils sprouting and leaves reappearing on trees. Oh, and then there’s the Data Security Protection Toolkit (DSPT) submission. To maintain compliance organisations are required to submit before 30th June each year. Changes</description>
      <pubDate>Mon, 06 Jan 2025 00:00:00 GMT</pubDate>
      <author>Kit Barker</author>
      <category>Compliance</category>
      <category>Frameworks</category>
    </item>
    <item>
      <title>Security as a Business Enabler: The Case for a Virtual CISO</title>
      <link>https://relatablesecurity.com/articles/security-as-a-business-enabler-the-case-for-a-virtual-ciso/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/security-as-a-business-enabler-the-case-for-a-virtual-ciso/</guid>
      <description>How growing organisations can access executive security expertise without the executive price tag Introduction In today’s increasingly digital economy, robust security practices and leadership are a genuine business enabler. Strong security governance doesn’t just reduce the risk of incidents, it opens doors to new business opportunities, builds customer trust, and drives competitive advantage. Take a</description>
      <pubDate>Tue, 17 Dec 2024 00:00:00 GMT</pubDate>
      <author>Kit Barker</author>
      <category>Security</category>
      <category>Governance</category>
    </item>
    <item>
      <title>Data Retention: Why It Matters and How to Stay Compliant</title>
      <link>https://relatablesecurity.com/articles/data-retention-why-it-matters-and-how-to-stay-compliant/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/data-retention-why-it-matters-and-how-to-stay-compliant/</guid>
      <description>A few years ago, I had a lightbulb moment during a review of our Data Retention Policy. Our legal advisor at the time made a striking comment: “Data is toxic.” His point was simple yet profound—keeping data longer than necessary or holding onto more than you need only increases your exposure to risk. This insight</description>
      <pubDate>Thu, 21 Nov 2024 00:00:00 GMT</pubDate>
      <author>Melissa George</author>
      <category>Compliance</category>
      <category>Risk Management</category>
    </item>
    <item>
      <title>ISO27001 transition</title>
      <link>https://relatablesecurity.com/articles/iso27001-transition/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/iso27001-transition/</guid>
      <description>If you’re still certified to ISO27001:2013 you have until 31st October 2025 to transition to ISO 27001:2022. After this deadline, organisations that haven’t switched to the new version will have their certification withdrawn. What are the key changes? While the core clauses in the 2022 standard remain the same, additional subclauses and clarifying notes have</description>
      <pubDate>Thu, 07 Nov 2024 00:00:00 GMT</pubDate>
      <author>Melissa George</author>
      <category>Compliance</category>
      <category>Frameworks</category>
    </item>
    <item>
      <title>The importance of culture</title>
      <link>https://relatablesecurity.com/articles/the-importance-of-culture/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/the-importance-of-culture/</guid>
      <description>Does your team bring every decision to you?Are you constantly firefighting, dealing with issues and being reactive?Is there a high turnover of staff?Are staff happiness scores low, or worst, not even measured?Is it sometimes easier just to perform tasks yourself? If you answered yes to any of the above, your company culture is in need</description>
      <pubDate>Mon, 14 Oct 2024 00:00:00 GMT</pubDate>
      <author>Melissa George</author>
      <category>Culture</category>
    </item>
    <item>
      <title>A positive view of risk</title>
      <link>https://relatablesecurity.com/articles/a-positive-view-of-risk/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/a-positive-view-of-risk/</guid>
      <description>When most people hear “risk management,” they imagine a bureaucratic process aimed at satisfying regulations or pleasing auditors. For many UK SMEs, this mindset turns risk management into a reluctant compliance chore. But this view is fundamentally flawed. Effective risk management is a proactive, empowering tool that helps businesses sharpen their security posture, improve decision-making</description>
      <pubDate>Mon, 07 Oct 2024 00:00:00 GMT</pubDate>
      <author>Kit Barker</author>
      <category>Risk Management</category>
      <category>Culture</category>
    </item>
    <item>
      <title>A Practical Guide to UK GDPR compliance</title>
      <link>https://relatablesecurity.com/articles/a-practical-guide-to-uk-gdpr-compliance/</link>
      <guid isPermaLink="true">https://relatablesecurity.com/articles/a-practical-guide-to-uk-gdpr-compliance/</guid>
      <description>As a small business owner in the UK, you may find the General Data Protection Regulation (GDPR) somewhat daunting. However, understanding and implementing GDPR compliance doesn’t have to be overwhelming. This guide aims to demystify GDPR and provide you with practical steps to ensure your business adheres to these important regulations. Understanding GDPR At its</description>
      <pubDate>Mon, 07 Oct 2024 00:00:00 GMT</pubDate>
      <author>Melissa George</author>
      <category>Compliance</category>
      <category>Frameworks</category>
    </item>
  </channel>
</rss>
