Brian Pennington
About Brian Pennington
Cyber Security Statistics
Cybersecurity and the Supply Chain
Cybersecurity for OT, IIoT and IoT
PCI DSS
BYOD: Only half of SMBs that allow employees to access corporate data with personal devices have policies in place
5 steps to respond to a security breach
Over 17% of documents in Office 365 contain sensitive data
Guest blog: PCI audits and how to recognize a good QSA auditor and partner
Top 5 Strategic Infosec issues in Higher Education
ICO, Michael McIntyre and the Data Protection Act
Cyber Security a Major Threat for Metals Industry: Top Three Lessons for Executives
The insurance implications of a cyber attack on the US power grid
Reaching the Cloud Era in the European Union
Risk managers identify the “big three” risks causing them their greatest concern
Data privacy: What do consumers really think
ICO publishes it’s annual report
Tor detections jump by more than 1,000%
Survey Shows Lack of Trust, Limited Visibility and Knowledge Gap between the Board and IT Security Professionals
TAKE UP OF CYBER INSURANCE REMAINS LOW
How Cyber Security Literate is the board?
Shadow Cloud Services 20 Times More Prevalent than Sanctioned Cloud
The majority Of Risk Professionals Without Coverage Are Considering Purchasing Cyber Insurance
Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps
Most Healthcare Organisations Have Experienced A Data Breach
Previous Page
1
2
3
4
5
6
…
25
Next Page
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here:
Cookie Policy
Subscribe
Subscribed
Brian Pennington
Join 158 other subscribers
Sign me up
Already have a WordPress.com account?
Log in now.
Brian Pennington
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar