Brian Pennington
About Brian Pennington
Cyber Security Statistics
Cybersecurity and the Supply Chain
Cybersecurity for OT, IIoT and IoT
PCI DSS
The risk to Industrial Control Systems and SCADA is believed to have substantially increased
The hospitality industry increases it’s adoption of Tokenization and P2Pe
Most Americans feel EMV chip cards make their debit or credit card transactions more secure
Top 10 technologies for information security and their implications for security organisations in 2014
Most organisations struggle to resolve the effects of a breach
Target breach was watershed event for Debit Card Security
Who breached the Data Protection Act in 2013? Find the complete list here.
Data Breaches for the first quarter of 2014
The Hidden Dangers of a Data Breach
110 million Americans hacked in the last 12 months
The Aftermath of a Mega Data Breach
62% believe that negativity toward U.S. based clouds is justified – survey
Most European organizations believe using a European cloud is easier from a regulatory and compliance perspective
Top Concerns for 2014 from Today’s CISOs
The Story Of A Phish
The three key findings from the Cisco 2014 Annual Security Report
How retail companies describe their Cyber Liability exposures
8 areas of computer security that have arisen during Data Breach investigations
ICO response to European Union Court of Justice ruling on online search results
Top 10 Tips for Cyber Resilience in businesses
Previous Page
1
…
6
7
8
9
10
…
25
Next Page
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here:
Cookie Policy
Subscribe
Subscribed
Brian Pennington
Join 158 other subscribers
Sign me up
Already have a WordPress.com account?
Log in now.
Brian Pennington
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar