Brian Pennington
About Brian Pennington
Cyber Security Statistics
Cybersecurity and the Supply Chain
Cybersecurity for OT, IIoT and IoT
PCI DSS
Uncategorized
Role of the Board of Directors in Information Security and Compliance
What IT Users and Business Users Think about Bring Your Own Identity (BYOID)
Why is there a Cloud Multiplier effect on the risk of a Data Breach?
Hospitality Industry alerted by the U.S. Secret Service on the threat of Keyloggers
Travel company fined £150,000 after losing 1,163,996 Credit and Debit Card records
Top 10 technologies for information security and their implications for security organisations in 2014
Target breach was watershed event for Debit Card Security
Data Breaches for the first quarter of 2014
110 million Americans hacked in the last 12 months
Most European organizations believe using a European cloud is easier from a regulatory and compliance perspective
Top Concerns for 2014 from Today’s CISOs
The Story Of A Phish
The three key findings from the Cisco 2014 Annual Security Report
How retail companies describe their Cyber Liability exposures
ICO response to European Union Court of Justice ruling on online search results
Top 10 Tips for Cyber Resilience in businesses
PCI DSS Version 3.0 Self Assessment Questionnaires
Cost of business cyber security breaches almost double
Cybercriminals see a 9% year on year improved yield on stolen records from $136 to $145
Tracking how fast a security incident is discovered and contained is the most important metric but not often used
Previous Page
1
2
3
4
5
…
7
Next Page
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here:
Cookie Policy
Subscribe
Subscribed
Brian Pennington
Join 158 other subscribers
Sign me up
Already have a WordPress.com account?
Log in now.
Brian Pennington
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar