Brian Pennington
About Brian Pennington
Cyber Security Statistics
Cybersecurity and the Supply Chain
Cybersecurity for OT, IIoT and IoT
PCI DSS
brian pennington
Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps
Most Healthcare Organisations Have Experienced A Data Breach
Two thirds of British workers willing to breach data protection rules
DDoS attack activity soars
Most consumers do not trust anyone to protect their personal information
The history of mobile threats, 2004 to 2015
Time to Identify Advanced Threats is 98 Days for Financial Services Firms and 197 Days for Retail
A review of websites and apps targeted at children is underway
What’s Keeping Higher Education CIOs up at Night?
The Evolution of Cyber Risk – and ACE Infographic
Enterprises have more than 2,000 unsafe mobile apps installed on employee devices
Path of a Cyber Attacker
5 Mobile Trends That Are Changing the Way Business Is Done
Cloud usage is extending the perimeter of most organisations
What Is Your Business’ Greatest Cyber Threat?
Non-Executive Directors have a responsibility to understand cyber security risks and resilience
Information Commissioner launches Corporate Plan setting out priorities for 2015-18
Mobile Insecurity as an Infographic
Who breached the Data Protection Act in 2014? Find the complete list here.
Office agrees it must do more to protect customer data
Previous Page
1
2
3
4
5
…
15
Next Page
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here:
Cookie Policy
Subscribe
Subscribed
Brian Pennington
Join 158 other subscribers
Sign me up
Already have a WordPress.com account?
Log in now.
Brian Pennington
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar