<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://brianpennington.co.uk/cyber-security-statistics/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/07/oig2-2.jpg</image:loc><image:title>OIG2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/07/oig2-1.jpg</image:loc><image:title>OIG2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/07/oig2.jpg</image:loc><image:title>OIG2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2020/05/security-protection-anti-virus-software-60504.jpeg</image:loc><image:title>security logo</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/security-logo-60504/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2026-03-30T11:10:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://brianpennington.co.uk/cybersecurity-for-ot-iiot-and-iot/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2023/04/pexels-photo-753331-1.jpeg</image:loc><image:title>white water boat</image:title><image:caption>Photo by Julius Silver on &lt;a href="https://www.pexels.com/photo/white-water-boat-753331/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2023/04/pexels-photo-753331.jpeg</image:loc><image:title>white water boat</image:title><image:caption>Photo by Julius Silver on &lt;a href="https://www.pexels.com/photo/white-water-boat-753331/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2023/04/otsec.jpg</image:loc><image:title>Volkswagen Revs Up ID.4 Electric Car Production</image:title><image:caption>ZWICKAU, GERMANY - SEPTEMBER 18: The new Volkswagen ID.4 electric sport utility vehicle (SUV) at the VW factory on September 18, 2020 in Zwickau, Germany. Volkswagen will officially present the ID.4 towards the end of September. In addition, Volkswagen also produces the smaller ID.3 at the Zwickau plant. Both cars are meant to lead the company towards mass sales in the electric car market and provide it with strong competition against rival Tesla. (Photo by Jens Schlueter/Getty Images)</image:caption></image:image><lastmod>2026-02-25T17:17:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://brianpennington.co.uk/cybersecurity-and-the-supply-chain/</loc><lastmod>2026-01-10T10:12:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://brianpennington.co.uk/2025/12/31/weak-enforcement-and-low-compliance-in-pci-dss-a-comparative-security-study/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2025/12/weak-enforcement-keeps-pci-dss-compliance-low.png</image:loc><image:title>Weak enforcement keeps PCI DSS compliance low</image:title></image:image><lastmod>2025-12-30T14:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2025/12/30/top-10-cyber-security-stories-of-2025/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2025/12/top-10-cybersecurity-stories-of-2025.png</image:loc><image:title>Top 10 cybersecurity stories of 2025</image:title></image:image><lastmod>2025-12-30T14:05:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/pci-dss/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/07/pci-dss-bp.jpeg</image:loc><image:title>PCI DSS BP</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/07/oig2-3.jpg</image:loc><image:title>OIG2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/06/pci-dss-bp.jpeg</image:loc><image:title>pci-dss-bp</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/02/pci-ssc.png</image:loc><image:title>pci ssc</image:title></image:image><lastmod>2025-12-30T11:42:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://brianpennington.co.uk/about/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/01/brian-pennington-standing.jpg</image:loc><image:title>Brian Pennington</image:title></image:image><lastmod>2025-07-21T08:30:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://brianpennington.co.uk/2025/07/17/the-continuing-threat-from-email-based-attacks/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2025/07/trend-micro-email-threat-landscape-2024-infographic-01-1-ksth9ow.jpg</image:loc><image:title>Trend Micro email threat landscape 2024 infographic-01 1-ksth9ow</image:title></image:image><lastmod>2025-07-17T08:51:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2023/09/15/cybersecurity-glossary/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/02/69ad04d6-b259-4fe9-b20f-486ef9ef92f1.jpeg</image:loc><image:title>69ad04d6-b259-4fe9-b20f-486ef9ef92f1</image:title></image:image><lastmod>2025-07-16T13:38:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2024/12/24/a-consolidated-list-of-2025-predictions/</loc><lastmod>2024-12-24T10:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2024/08/14/the-most-common-phishing-attacks-in-one-simple-infographic-from-knowbe4/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/08/tr_20240812-knowbe4-q2-phishing-report-figure_a.webp</image:loc><image:title>tr_20240812-knowbe4-q2-phishing-report-figure_a</image:title></image:image><lastmod>2024-09-07T16:18:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2024/08/11/instant-expertise-how-interim-cisos-fill-critical-leadership-gaps/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/08/interim-cisos-blog.png</image:loc><image:title>Interim CISOs - blog</image:title></image:image><lastmod>2024-08-11T07:18:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2024/03/01/the-iso-27000-family-of-protocols-and-their-role-in-cybersecurity/</loc><lastmod>2024-03-01T09:01:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2024/02/26/which-countries-account-for-the-most-hacking/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/02/statista-countries-responsible-for-cyber-incidents.jpeg</image:loc><image:title>statista-countries-responsible-for-cyber-incidents</image:title></image:image><lastmod>2024-02-26T21:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2024/02/22/26-cyber-security-stats-every-user-should-be-aware-of-in-2024/</loc><lastmod>2024-02-22T15:40:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2024/02/09/top-10-cyber-incidents-report-2023-based-on-the-financial-impact-and-reputational-damage/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2024/02/th-top-10-cover.jpg</image:loc><image:title>th-top-10-cover</image:title></image:image><lastmod>2024-02-09T14:20:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2023/05/02/the-home-page-has-not-been-updated-for-a-while-but-the-other-pages-have-and-contain-a-lot-of-useful-information-on-specific-topics-1-5-2023/</loc><lastmod>2024-02-09T09:37:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2020/05/25/the-history-and-future-of-passwords-infograph/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2020/05/history-and-future-of-passwords-2.jpg</image:loc><image:title>history-and-future-of-passwords (2)</image:title></image:image><lastmod>2020-05-22T10:46:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2018/12/29/the-owasp-iot-project-top-10/</loc><lastmod>2018-12-29T16:09:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2018/11/20/21-significant-21st-century-data-breaches-infographic/</loc><lastmod>2018-11-20T17:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2018/10/29/infographic-how-to-solve-the-cybersecurity-talent-gap-in-your-organization/</loc><lastmod>2018-10-29T10:38:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/08/30/2018-changes-to-pci-dss-v3-2/</loc><lastmod>2017-08-30T14:15:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/08/30/11-cyber-security-questions-every-small-business-should-ask/</loc><lastmod>2017-08-30T12:12:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/06/28/ico-warning-to-smes-as-firm-hit-by-cyber-attack-fined-60000/</loc><lastmod>2017-06-28T07:42:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/06/10/is-the-north-west-a-hub-for-nuisance-calls/</loc><lastmod>2017-06-10T10:53:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/05/30/technological-change-and-cyber-risk-overtake-regulation-as-top-risks-for-insurers/</loc><lastmod>2017-05-30T08:06:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/05/26/will-gdpr-change-the-world/</loc><lastmod>2017-05-26T10:43:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/05/16/ico-statement-on-recent-cyber-attacks-on-the-nhs/</loc><lastmod>2017-05-16T07:14:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/03/27/vmware-infographic-are-you-ready-to-tackle-the-security-risks-facing-your-business/</loc><lastmod>2017-03-27T11:06:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/03/08/cyber-screening-putting-security-on-the-ma-agenda/</loc><lastmod>2017-03-07T14:21:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/03/07/elizabeth-denhams-speech-at-the-data-protection-practitioners-conference-2017/</loc><lastmod>2017-03-07T08:27:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/02/17/advice-from-an-assessor-devops-automation-security-and-compliance/</loc><lastmod>2017-02-17T13:50:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/02/15/car-cracking/</loc><lastmod>2017-02-15T16:02:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2017/02/15/future-of-automotive-security-technology-research-releases-secure-vehicle-manifesto/</loc><lastmod>2017-02-15T13:06:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/10/31/forrester-predicts-the-top-15-dynamics-that-will-shape-2017/</loc><lastmod>2016-10-31T16:36:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/06/13/byod-security-market-to-reach-over-337-million/</loc><lastmod>2016-06-13T07:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/05/20/your-biggest-weakness-is-already-on-your-payroll/</loc><lastmod>2016-05-20T11:08:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/05/16/100-percent-of-retailers-disclose-cyber-risks/</loc><lastmod>2016-05-16T07:25:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/03/22/demystifying-9-common-types-of-cyber-risk/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/03/rxss.gif</image:loc><image:title>RXSS</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/03/card-skimmer-and-camera.jpg</image:loc><image:title>Card Skimmer and Camera</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/03/botnet-and-tcp-image.jpg</image:loc><image:title>Botnet and TCP image</image:title></image:image><lastmod>2016-03-22T09:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/03/21/86-of-mobile-applications-failed-at-least-2-of-owasps-top-10/</loc><lastmod>2016-03-20T09:46:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/03/20/breaches-caused-by-either-hacking-or-malware-nearly-doubled-in-relative-frequency/</loc><lastmod>2016-03-20T09:45:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/03/15/the-state-of-cybersecurity-in-healthcare-organizations-in-2016/</loc><lastmod>2016-03-15T21:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2016/02/16/over-35-of-organisations-in-the-energy-sector-are-not-able-to-track-threats/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/02/tripwire-2016-energy-survey-physical-damage-4.png</image:loc><image:title>tripwire-2016-energy-survey-physical-damage- 4</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/02/tripwire-2016-energy-survey-physical-damage-3.png</image:loc><image:title>tripwire-2016-energy-survey-physical-damage- 3</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/02/tripwire-2016-energy-survey-physical-damage-2.png</image:loc><image:title>tripwire-2016-energy-survey-physical-damage- 2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/02/tripwire-2016-energy-survey-physical-damage1.png</image:loc><image:title>tripwire-2016-energy-survey-physical-damage-</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2016/02/tripwire-2016-energy-survey-physical-damage.png</image:loc><image:title>tripwire-2016-energy-survey-physical-damage-</image:title></image:image><lastmod>2016-02-16T10:56:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/12/30/more-fines-next-year-for-nuisance-call-companies/</loc><lastmod>2015-12-30T15:35:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/12/21/utilities-oil-and-gas-sectors-face-increasing-security-threats-an-infographic/</loc><lastmod>2015-12-21T16:10:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/12/21/pci-ssc-revises-date-for-migrating-off-vulnerable-ssl-and-early-tls-encryption/</loc><lastmod>2015-12-21T08:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/12/10/pci-security-standards-council-announces-2016-special-interest-group-election-results/</loc><lastmod>2015-12-10T18:18:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/12/10/how-to-hack-a-car-an-infograph/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/12/how-car-hack-attacks-are-happening-infographic-large.jpg</image:loc><image:title>how-car-hack-attacks-are-happening-infographic-large</image:title></image:image><lastmod>2015-12-07T08:36:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/11/12/are-british-businesses-over-confident-about-the-threat-of-data-breaches/</loc><lastmod>2015-11-12T10:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/11/09/a-brief-history-of-security-data-breaches-and-regulation-in-healthcare/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/11/datamotion_ig4_briefhistoryofhcdatabreaches_092915.png</image:loc><image:title>DataMotion_IG4_BriefHistoryofHCDataBreaches_092915</image:title></image:image><lastmod>2015-11-09T15:04:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/11/06/500-european-business-leaders-attend-the-pci-security-standards-council-community-meeting/</loc><lastmod>2015-11-06T09:55:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/10/06/ico-response-to-ecj-ruling-on-personal-data-to-us-safe-harbor/</loc><lastmod>2015-10-06T16:03:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/10/02/policy-problems-with-cloud-storage-revealed-by-survey/</loc><lastmod>2015-10-02T07:43:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/30/payment-card-industry-issues-new-guidance-to-help-organizations-respond-to-data-breaches/</loc><lastmod>2015-09-30T07:04:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/29/standard-poors-labeled-holes-in-cybersecurity-a-financial-risk-in-a-report/</loc><lastmod>2015-10-29T09:24:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/28/mobile-payments-data-breaches-will-grow/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/09/csx-mobile-3-lg.jpg</image:loc><image:title>CSX-Mobile-3-lg</image:title></image:image><lastmod>2015-09-28T07:20:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/24/security-and-the-internet-of-things-infograph/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/09/security-and-the-internet-of-things_jpg.jpg</image:loc><image:title>Security-and-the-Internet-of-Things_jpg</image:title></image:image><lastmod>2015-09-24T07:42:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/21/in-cloud-environments-75-of-the-security-risk-can-be-attributed-to-just-1-of-users/</loc><lastmod>2015-09-19T17:31:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/21/internal-audit-is-having-an-ever-increasing-role-in-cyber-security/</loc><lastmod>2015-09-19T17:04:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/10/data-breaches-are-you-prepared/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/09/thomson-reuters-data-breaches.png</image:loc><image:title>Thomson Reuters data-breaches</image:title></image:image><lastmod>2015-09-10T10:47:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/08/cost-of-phishing-and-value-of-employee-training/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/09/phishing.png</image:loc><image:title>Phishing</image:title></image:image><lastmod>2015-09-08T09:55:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/09/07/uk-business-unprepared-for-changes-to-the-data-protection-act/</loc><lastmod>2015-09-07T10:36:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/08/25/cyber-insurance-trying-to-quantify-risks/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/08/broken-chain.jpg</image:loc></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/08/data-breach-costs.png</image:loc></image:image><lastmod>2015-08-25T10:53:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/08/24/2015-best-worst-tourist-attractions-for-mobile-security/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/08/hacked-mobiles-infographic.jpg</image:loc><image:title>Skycure_MapInfographic-v15</image:title></image:image><lastmod>2015-08-24T16:18:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/08/23/personal-data-in-leaked-datasets-is-still-personal-data-ico/</loc><lastmod>2015-08-23T15:19:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/08/20/64-of-organizations-are-potential-targets-for-nation-state-cyberattacks/</loc><lastmod>2015-08-20T09:38:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/08/12/cybersecurity-the-looming-and-growing-threat/</loc><lastmod>2015-08-17T06:06:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/08/10/byod-only-half-of-smbs-that-allow-employees-to-access-corporate-data-with-personal-devices-have-policies-in-place/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/08/uk-avast-for-business-infographic.jpg</image:loc><image:title>UK-Avast-for-Business-INFOGRAPHIC</image:title></image:image><lastmod>2015-08-10T08:12:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/31/5-steps-to-respond-to-a-security-breach/</loc><lastmod>2015-07-31T13:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/30/over-17-of-documents-in-office-365-contain-sensitive-data/</loc><lastmod>2015-07-30T13:07:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/23/guest-blog-pci-audits-and-how-to-recognize-a-good-qsa-auditor-and-partner/</loc><lastmod>2015-07-23T10:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/17/top-5-strategic-infosec-issues-in-higher-education/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/07/educause-infographic.jpg</image:loc><image:title>educause-infographic'</image:title></image:image><lastmod>2015-07-17T15:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/16/ico-michael-mcintyre-and-the-data-protection-act/</loc><lastmod>2015-07-16T08:22:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/09/cyber-security-a-major-threat-for-metals-industry-top-three-lessons-for-executives/</loc><lastmod>2015-07-08T10:57:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/09/the-insurance-implications-of-a-cyber-attack-on-the-us-power-grid/</loc><lastmod>2015-07-08T10:40:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/08/reaching-the-cloud-era-in-the-european-union/</loc><lastmod>2015-07-08T09:23:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/07/risk-managers-identify-the-big-three-risks-causing-them-their-greatest-concern/</loc><lastmod>2015-07-07T11:55:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/06/data-privacy-what-do-consumers-really-think/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/07/dma-privacy.png</image:loc><image:title>DMA Privacy</image:title></image:image><lastmod>2015-07-06T10:14:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/07/02/ico-publishes-its-annual-report/</loc><lastmod>2015-07-06T21:50:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/06/24/tor-detections-jump-by-more-than-1000/</loc><lastmod>2015-06-24T10:41:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/06/24/survey-shows-lack-of-trust-limited-visibility-and-knowledge-gap-between-the-board-and-it-security-professionals/</loc><lastmod>2015-06-23T15:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/06/23/take-up-of-cyber-insurance-remains-low/</loc><lastmod>2015-06-23T11:11:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/06/22/how-cyber-security-literate-is-the-board/</loc><lastmod>2015-06-22T16:13:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/06/16/shadow-cloud-services-20-times-more-prevalent-than-sanctioned-cloud/</loc><lastmod>2015-06-15T07:32:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/06/09/the-majority-of-risk-professionals-without-coverage-are-considering-purchasing-cyber-insurance/</loc><lastmod>2015-06-09T07:39:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/06/02/workers-ignoring-known-cyber-risks-surfing-adult-content-and-downloading-unapproved-apps/</loc><lastmod>2015-06-01T07:13:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/31/most-healthcare-organisations-have-experienced-a-data-breach/</loc><lastmod>2015-05-31T19:30:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/29/two-thirds-of-british-workers-willing-to-breach-data-protection-rules/</loc><lastmod>2015-05-29T09:02:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/03/17/who-has-breached-the-data-protection-act-in-2014-find-the-complete-list-here/</loc><lastmod>2015-05-27T10:50:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/21/the-history-of-mobile-threats-2004-to-2015/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/05/sophos-mobile-malware-infographic-700.png</image:loc><image:title>sophos-mobile-malware-infographic-700</image:title></image:image><lastmod>2015-05-21T15:34:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/26/ddos-attack-activity-soars/</loc><lastmod>2015-05-21T15:30:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/22/most-consumers-do-not-trust-anyone-to-protect-their-personal-information/</loc><lastmod>2015-05-25T15:29:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/19/time-to-identify-advanced-threats-is-98-days-for-financial-services-firms-and-197-days-for-retail/</loc><lastmod>2015-05-19T21:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/14/congratulations-to-the-new-board-members-of-the-pci-standards-council/</loc><lastmod>2015-05-14T19:58:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/12/a-review-of-websites-and-apps-targeted-at-children-is-underway/</loc><lastmod>2015-05-12T07:05:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/10/whats-keeping-higher-education-cios-up-at-night/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/05/whats-keeping-higher-education-cios-up-at-night-1-638.jpg</image:loc><image:title>whats-keeping-higher-education-cios-up-at-night-1-638</image:title></image:image><lastmod>2015-05-11T06:58:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/07/the-evolution-of-cyber-risk-and-ace-infographic/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/05/evolution-of-cyberrisk-2.png</image:loc><image:title>evolution of cyberrisk 2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/05/evolution-of-cyberrisk-1.png</image:loc><image:title>Evolution of Cyberrisk 1</image:title></image:image><lastmod>2015-05-07T07:21:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/05/01/pci-council-collaborates-with-industry-to-speed-secure-chip-card-acceptance-for-merchants/</loc><lastmod>2015-05-01T08:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/28/proposed-european-wide-data-protection-act-a-review/</loc><lastmod>2015-04-27T12:16:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/04/27/85000-new-malicious-ips-are-launched-every-day/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/04/webroot-2015-threat-brief-infographic-vfinal.jpg</image:loc><image:title>Threat-Brief-Infographic-5</image:title></image:image><lastmod>2015-04-25T13:25:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/04/19/cloud-usage-is-extending-the-perimeter-of-most-organisations/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/04/cloudlock-key-findings.jpg</image:loc><image:title>Cloudlock key findings</image:title></image:image><lastmod>2015-04-20T07:02:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/04/22/average-large-enterprise-has-more-than-2000-unsafe-mobile-apps-installed-on-employee-devices/</loc><lastmod>2015-04-19T18:33:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/04/21/path-of-a-cyber-attacker/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/04/infograph-path-cyberattacker.jpg</image:loc><image:title>infograph-path-cyberattacker</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/04/infographic_data_loss_sealpath.jpg</image:loc><image:title>infographic_data_loss_sealpath</image:title></image:image><lastmod>2015-04-19T14:56:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/04/20/5-mobile-trends-that-are-changing-the-way-business-is-done/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/04/5-cloud-mobility-trends.jpg</image:loc><image:title>5 Cloud Mobility Trends</image:title></image:image><lastmod>2015-04-19T14:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/04/05/what-is-your-business-greatest-cyber-threat/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/04/what-i1.jpg</image:loc><image:title>WHAT-I~1</image:title></image:image><lastmod>2015-04-05T13:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/03/27/non-executive-directors-have-a-responsibility-to-understand-cyber-security-risks-and-resilience/</loc><lastmod>2015-03-27T12:46:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/03/22/information-commissioner-launches-corporate-plan-setting-out-priorities-for-2015-18/</loc><lastmod>2015-03-22T16:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/03/22/mobile-insecurity-as-an-infographic/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/03/ibm-mobile-insecurity.png</image:loc><image:title>IBM Mobile Insecurity</image:title></image:image><lastmod>2015-03-22T13:29:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/02/12/cloud-contactless-e-commerce-tokenization-and-v-me-surging-forward/</loc><lastmod>2015-02-16T13:24:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/01/20/office-agrees-it-must-do-more-to-protect-customer-data/</loc><lastmod>2015-01-20T08:39:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/01/16/cyber-insurance-is-a-major-growth-area-for-commercial-insurers/</loc><lastmod>2015-01-16T11:17:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/01/09/reducing-cyber-risk-marine-transportation-system-cybersecurity-standards-liability-protection-and-cyber-insurance/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2015/01/container-ship.jpg</image:loc><image:title>Container ship</image:title></image:image><lastmod>2015-01-10T11:54:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2015/01/05/2014-in-review/</loc><lastmod>2015-01-03T12:43:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/12/29/complying-with-pci-dss-requirement-9-9-white-paper/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/12/pci-dss_requirement_9-9.jpg</image:loc><image:title>PCI-DSS_Requirement_9-9</image:title></image:image><lastmod>2014-12-28T15:08:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/12/28/pci-dss-2015-poll-are-you-planning-anything-different-in-light-of-v3-0/</loc><lastmod>2014-12-28T15:02:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/12/19/cloud-security-what-higher-education-needs-to-know/</loc><lastmod>2014-12-19T10:58:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/12/11/corporate-data-a-protected-asset-or-a-ticking-time-bomb/</loc><lastmod>2014-12-11T20:14:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/12/10/top-10-cybersecurity-predictions-for-2015-an-infographic/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/12/coalfire_cybersecuritypredictions_72-01.jpg</image:loc><image:title>Coalfire_CybersecurityPredictions_72-01</image:title></image:image><lastmod>2014-12-10T11:10:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/12/09/in-2015-the-cost-of-cybersecurity-and-risk-management-will-remain-on-track-to-double/</loc><lastmod>2014-12-09T12:43:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/12/03/what-you-need-to-know-about-tokenization/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/12/tokenization.jpg</image:loc><image:title>Tokenization</image:title></image:image><lastmod>2014-12-03T15:25:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/11/29/2015-security-predictions/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/11/symantec_7m2p1.jpg</image:loc><image:title>symantec_7m2p1</image:title></image:image><lastmod>2014-12-05T14:18:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/11/27/4362/</loc><lastmod>2014-12-28T15:02:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/11/21/blackenergy-malware-threat-has-some-cybersecurity-experts-uneasy/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/11/powergrid.jpg</image:loc><image:title>powergrid</image:title></image:image><lastmod>2014-11-21T17:41:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/11/19/the-costs-of-a-cloud-data-breach-revealed/</loc><lastmod>2014-11-27T11:41:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/10/31/the-many-faces-of-hackers-the-personas-to-defend-against/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/10/many-faces-of-a-hacker.jpg</image:loc><image:title>Many Faces of a Hacker</image:title></image:image><lastmod>2014-11-26T16:06:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/10/30/information-security-and-cyber-liability-risk-management-a-2014-survey/</loc><lastmod>2014-10-30T09:20:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/10/29/cyber-attacks-on-u-s-companies-in-2014/</loc><lastmod>2014-10-29T10:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/10/27/cyber-data-breach-is-your-business-ready/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/10/newagencypartners-2.jpg</image:loc><image:title>NewAgencyPartners 2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/10/newagencypartners.jpg</image:loc><image:title>NewAgencyPartners</image:title></image:image><lastmod>2014-10-28T09:53:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/10/23/sifma-publishes-recommendations-for-effective-cybersecurity-regulatory-guidance/</loc><lastmod>2014-10-23T07:04:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/10/18/2014-global-report-on-the-cost-of-cyber-crime-a-hp-ponemon-study/</loc><lastmod>2014-10-18T15:31:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/09/27/95-of-enterprises-allow-byod/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/09/winning-with-mobile-infographic-700x2520.jpg</image:loc><image:title>winning-with-mobile-infographic-700x2520</image:title></image:image><lastmod>2014-10-12T16:27:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/09/13/private-cloud-security-keeps-it-up-at-night/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/09/catbird_survey_infographic.png</image:loc><image:title>Catbird_Survey_Infographic</image:title></image:image><lastmod>2014-09-13T11:26:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/09/10/85-of-mobile-apps-fail-to-provide-basic-privacy-information/</loc><lastmod>2014-09-12T06:43:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/09/05/mobile-malware-up-68-in-6-months/</loc><lastmod>2014-09-06T14:01:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/08/22/vmware-guides-that-will-help-you-with-your-complaince-efforts/</loc><lastmod>2014-08-22T12:21:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/08/19/what-to-do-in-the-case-of-a-cyber-security-related-emergency/</loc><lastmod>2014-08-19T16:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/08/12/role-of-the-board-of-directors-in-information-security-and-compliance/</loc><lastmod>2014-08-12T12:50:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/08/08/pci-security-standards-council-publishes-third-party-security-assurance-guidance/</loc><lastmod>2014-08-08T07:18:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/08/07/what-it-users-and-business-users-think-about-bring-your-own-identity-byoid/</loc><lastmod>2014-08-07T18:08:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/08/05/information-commissioners-office-provides-data-protection-advice-to-the-legal-profession/</loc><lastmod>2014-08-05T14:40:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/16/who-has-breached-the-data-protection-act-in-2012-find-the-complete-list-here/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/08/ico_twitter.jpg</image:loc><image:title>ICO</image:title></image:image><lastmod>2014-08-01T10:46:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/31/point-of-sale-malware-and-the-7-stages-of-an-attack/</loc><lastmod>2014-07-31T15:53:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/31/why-is-there-a-cloud-multiplier-effect-on-the-risk-of-a-data-breach/</loc><lastmod>2014-07-31T09:23:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/29/hospitality-industry-alerted-by-the-u-s-secret-service-on-the-threat-of-keyloggers/</loc><lastmod>2014-07-29T12:21:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/28/the-top-7-hipaa-risk-analysis-myths/</loc><lastmod>2014-07-28T08:57:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/24/travel-company-fined-150000-after-losing-1163996-credit-and-debit-card-records/</loc><lastmod>2014-07-24T14:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/24/sony-has-reached-a-class-action-settlement-for-its-psn-data-breach/</loc><lastmod>2014-07-24T09:40:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/22/29-of-consumers-dont-trust-retailers-with-securing-their-data/</loc><lastmod>2014-07-22T14:06:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/16/65-have-experienced-an-sql-injection-attack/</loc><lastmod>2014-07-15T22:20:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/11/the-risk-to-industrial-control-systems-and-scada-is-believed-to-have-substantially-increased/</loc><lastmod>2014-07-11T15:03:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/08/the-hospitality-industry-increases-its-adoption-of-tokenization-and-p2pe/</loc><lastmod>2014-07-08T13:50:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/07/03/most-americans-feel-emv-chip-cards-make-their-debit-or-credit-card-transactions-more-secure/</loc><lastmod>2014-07-03T19:30:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/06/26/top-10-technologies-for-information-security-and-their-implications-for-security-organisations-in-2014/</loc><lastmod>2014-06-26T11:30:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/06/26/most-organisations-struggle-to-resolve-the-effects-of-a-breach/</loc><lastmod>2014-06-26T08:55:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/06/25/target-breach-was-watershed-event-for-debit-card-security/</loc><lastmod>2014-06-25T12:26:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/06/17/who-breached-the-data-protection-act-in-2013-find-the-complete-list-here/</loc><lastmod>2014-06-17T15:21:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/06/15/data-breaches-for-the-first-quarter-of-2014/</loc><lastmod>2014-06-15T12:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/06/03/the-hidden-dangers-of-a-data-breach/</loc><lastmod>2014-06-03T07:59:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/06/01/110-million-americans-hacked-in-the-last-12-months/</loc><lastmod>2014-06-01T13:54:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/30/the-aftermath-of-a-mega-data-breach/</loc><lastmod>2014-05-30T08:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/28/62-believe-that-negativity-toward-u-s-based-clouds-is-justified-survey/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2014/05/perspecsys-logo_header.png</image:loc><image:title>Perspecsys logo_header</image:title></image:image><lastmod>2014-05-28T12:03:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/27/most-european-organizations-believe-using-a-european-cloud-is-easier-from-a-regulatory-and-compliance-perspective/</loc><lastmod>2014-05-27T09:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/16/top-concerns-for-2014-from-todays-cisos/</loc><lastmod>2014-06-19T13:46:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/16/the-story-of-a-phish/</loc><lastmod>2014-05-16T13:06:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/16/the-three-key-findings-from-the-cisco-2014-annual-security-report/</loc><lastmod>2014-05-16T10:55:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/15/how-retail-companies-describe-their-cyber-liability-exposures/</loc><lastmod>2014-05-15T09:27:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/14/8-areas-of-computer-security-that-have-arisen-during-data-breach-investigations/</loc><lastmod>2014-05-14T10:46:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/14/ico-response-to-european-union-court-of-justice-ruling-on-online-search-results/</loc><lastmod>2014-05-14T10:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/13/top-10-tips-for-cyber-resilience-in-businesses/</loc><lastmod>2014-05-13T09:10:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/12/more-organisations-opting-to-take-out-cyber-insurance/</loc><lastmod>2014-05-12T10:43:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/11/pci-dss-version-3-0-self-assessment-questionnaires/</loc><lastmod>2014-05-11T13:28:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/10/cost-of-business-cyber-security-breaches-almost-double/</loc><lastmod>2014-05-10T12:37:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/08/retail-and-financial-sectors-overly-confident-about-breach-detection/</loc><lastmod>2014-12-15T17:24:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/07/cybercriminals-see-a-9-year-on-year-improved-yield-on-stolen-records-from-136-to-145/</loc><lastmod>2014-05-07T08:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/05/tracking-how-fast-a-security-incident-is-discovered-and-contained-is-the-most-important-metric-but-not-often-used/</loc><lastmod>2014-05-05T18:30:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/04/security-metrics-to-manage-change-which-matter-which-can-be-measured-a-ponemon-study/</loc><lastmod>2014-05-04T15:40:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/05/01/another-successful-infosecurity-europe-finishes/</loc><lastmod>2014-05-01T16:43:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/04/24/zurich-insurance-identifies-the-seven-cyber-risks-that-threaten-systemic-shock/</loc><lastmod>2014-04-24T08:49:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/04/17/65-of-organisations-have-been-breached-by-a-sql-injection-attack/</loc><lastmod>2014-04-17T08:45:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/04/11/profile-of-growing-attacks-against-the-internet-infrastructure-infographic/</loc><lastmod>2014-04-14T07:38:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/03/19/health-sector-needs-to-improve-its-data-protection/</loc><lastmod>2014-03-19T09:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/03/05/a-third-of-canadians-are-victims-of-financial-fraud/</loc><lastmod>2014-03-05T07:59:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/28/p2pe-pseudo-p2pe-end-2-end-encryption-linked-encryption-they-are-all-good/</loc><lastmod>2014-02-28T14:37:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/21/emv-the-perspective-of-a-qsa-who-has-worked-on-both-sides-of-the-atlantic/</loc><lastmod>2014-02-28T10:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/27/increasing-security-and-reducing-fraud-with-emv-chip-and-pci-standards-an-infographic/</loc><lastmod>2014-02-27T14:05:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/21/dells-new-unknown-threats-infographic/</loc><lastmod>2014-02-21T15:37:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/21/pa-dss-and-pci-dss-version-3-0-now-available-in-9-languages/</loc><lastmod>2014-02-21T14:24:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/20/byod-cloud-and-the-internet-are-the-top-areas-of-concern-for-security-threats/</loc><lastmod>2014-02-21T09:30:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/13/uk-us-and-global-business-have-different-opinions-on-the-risk-of-cyber-security/</loc><lastmod>2014-02-13T09:41:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/12/european-union-data-protection-and-the-dangers-of-the-web/</loc><lastmod>2014-02-12T17:03:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/02/10/the-european-cybercrime-centre-one-year-on/</loc><lastmod>2014-02-10T15:27:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2014/01/02/no-such-thing-as-hacker-proof-a-deloitte-infographic/</loc><lastmod>2014-01-02T21:42:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/12/11/europes-threat-landscape-2013-a-report-by-enisa/</loc><lastmod>2013-12-11T17:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/11/29/uk-banks-and-financial-market-infrastructures-have-experienced-cyber-attacks/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2013/11/bank-of-england-chart.png</image:loc><image:title>Bank of England Chart</image:title></image:image><lastmod>2014-01-07T15:51:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/11/22/challenges-to-maintaining-a-strong-security-posture/</loc><lastmod>2013-11-22T12:16:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/11/14/lloyds-risk-index-has-cyber-risk-rising-from-12th-to-3rd-place/</loc><lastmod>2013-11-14T13:57:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/11/06/employees-and-companies-not-taking-byod-security-seriously/</loc><lastmod>2013-11-06T16:19:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/10/25/a-summary-of-the-2013-pci-ssc-north-america-community-meeting-by-matt-getzelman/</loc><lastmod>2013-10-25T10:21:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/10/17/the-five-cloud-personas/</loc><lastmod>2013-10-17T15:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/10/11/the-nightmare-of-securing-your-unstructured-data-in-the-era-of-the-borderless-enterprise/</loc><lastmod>2013-10-12T04:19:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/10/11/consumers-do-not-believe-call-centres-do-enough-to-keep-their-credit-card-and-personal-information-safe/</loc><lastmod>2013-10-13T18:54:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/09/04/rsas-august-2013-online-fraud-report-featuring-a-review-of-phish-lockers/</loc><lastmod>2013-10-08T20:08:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/10/08/users-show-a-flagrant-disregard-for-data-protection-when-storing-data/</loc><lastmod>2013-10-08T11:31:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/10/07/rsas-september-2013-online-fraud-report-featuring-a-review-of-education-in-the-cybercriminal-world/</loc><lastmod>2013-10-07T07:45:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/10/01/pci-dss-and-vmware/</loc><lastmod>2013-10-01T16:22:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/09/22/airline-information-group-aig-accuses-hotels-and-facebook-of-being-culpable-in-credit-card-fraud/</loc><lastmod>2013-09-22T13:43:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/09/19/the-cost-of-insecurity/</loc><lastmod>2014-01-02T22:17:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/09/13/professional-security-training-is-substantially-better-than-powerpoint-or-handouts/</loc><lastmod>2013-09-13T13:31:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/09/10/3-simple-tips-to-improve-security-in-the-cloud/</loc><lastmod>2013-09-16T19:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/09/06/qa-on-information-security-workforce/</loc><lastmod>2013-09-06T16:25:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/08/20/100000-new-security-threats-are-identified-each-day/</loc><lastmod>2013-08-22T05:10:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/19/infographic-byod-security-is-still-a-problem/</loc><lastmod>2013-08-20T10:08:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/18/infographic-email-security-perception-v-reality/</loc><lastmod>2013-08-20T10:06:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/30/is-your-data-secure-infographic/</loc><lastmod>2013-09-10T03:55:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/08/01/the-state-of-corporate-mobile-data/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2013/08/druva-insync-mobile-corporate-data-corrected-jpeg2.jpg</image:loc><image:title>druva-insync-mobile-corporate-data-corrected jpeg</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2013/08/druva-insync-mobile-corporate-data-corrected-jpeg1.jpg</image:loc><image:title>druva-insync-mobile-corporate-data-corrected jpeg</image:title></image:image><lastmod>2013-08-20T09:57:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/08/15/the-lack-of-live-cyberthreat-intelligence-could-be-costing-businesses-millions/</loc><lastmod>2013-08-20T09:53:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/08/16/pci-dss-version-3-what-does-it-have-in-store-for-you/</loc><lastmod>2013-08-20T09:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/08/18/pci-dss-and-pa-dss-version-3-0-the-full-highlights-and-changes/</loc><lastmod>2013-09-08T22:53:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/08/18/3687/</loc><lastmod>2013-08-19T11:31:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/08/12/94-of-all-data-compromised-involves-servers/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2013/08/is-your-business-safe-from-a-cyber-attack2.jpg</image:loc><image:title>Is your business safe from a cyber attack</image:title></image:image><lastmod>2013-08-12T09:04:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/26/who-breached-the-data-protection-act-in-the-first-half-of-2013/</loc><lastmod>2013-09-16T19:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/26/list-of-businesses-targeted-by-global-hacking-ring-that-stole-160-million-credit-and-debit-card-numbers/</loc><lastmod>2013-07-26T11:02:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/23/rsas-july-2013-online-fraud-report-featuring-the-carberp-trojan-code/</loc><lastmod>2013-07-23T19:35:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/22/outside-of-london-slough-is-the-largest-fraud-centre-but-is-still-smaller-that-the-tope-10-london-zones/</loc><lastmod>2013-07-22T12:51:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/19/merchants-and-aquirers-to-share-pci-lessons-learned-at-pci-ssc-community-meetings/</loc><lastmod>2013-07-19T12:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/18/overconfident-employees-and-lack-of-email-security-tools-lead-to-risky-behavior/</loc><lastmod>2013-07-18T15:05:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/18/customers-are-demanding-suppliers-prove-their-security-credentials/</loc><lastmod>2013-07-18T13:40:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/17/it-security-still-not-protecting-the-right-assets-despite-increased-spending-2/</loc><lastmod>2013-07-17T13:19:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/16/it-security-still-not-protecting-the-right-assets-despite-increased-spending/</loc><lastmod>2013-07-17T13:05:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/17/most-companines-are-vulnerable-to-byod-risks/</loc><lastmod>2013-07-17T13:01:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/16/businesses-know-they-need-risk-management-but-are-overwhelmed-by-the-information-they-have-to-manage/</loc><lastmod>2013-07-16T10:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/04/rsas-june-2013-online-fraud-report-featuring-the-bugat-trojan/</loc><lastmod>2013-07-04T10:28:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/07/02/uk-digital-economy-act-2010-copyright-update/</loc><lastmod>2013-07-02T16:05:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/06/24/smes-are-putting-larger-customers-at-risk-of-security-breaches/</loc><lastmod>2013-06-27T15:02:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/06/20/uks-information-commissioner-believes-2013-will-the-year-businesses-handle-data-correctly/</loc><lastmod>2013-06-20T15:12:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/06/04/is-the-concern-for-data-protection-making-50-of-employees-less-productive/</loc><lastmod>2013-06-04T11:20:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/06/03/top-tips-from-the-ico-for-when-you-are-moving-premises-do-not-forget-to-check-the-cabinets-being-one/</loc><lastmod>2013-06-03T11:33:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/06/03/finally-a-prosecution-of-a-former-employee-stealing-confidential-information/</loc><lastmod>2013-06-03T09:33:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/30/schools-are-concerned-about-cloud-security/</loc><lastmod>2013-05-30T13:09:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/28/the-drivers-for-byod/</loc><lastmod>2013-05-28T12:34:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/25/irish-data-protection-commissioner-publishes-his-2012-annual-report/</loc><lastmod>2013-05-25T14:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/23/76-of-companies-have-had-a-data-breach-or-expect-to-have-a-breach/</loc><lastmod>2013-05-29T07:48:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/22/uk-governments-update-on-its-activities-to-protect-children-on-the-internet/</loc><lastmod>2013-05-22T11:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/21/small-firms-lose-up-to-800-million-to-cyber-crime-a-year/</loc><lastmod>2013-05-21T17:02:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/16/pci-security-standards-council-announces-new-board-of-advisors/</loc><lastmod>2013-05-16T11:51:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/13/rsas-april-online-fraud-report-2013-with-a-focus-on-the-changes-in-phishing-tactics/</loc><lastmod>2013-05-13T13:40:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/05/09/pci-security-standards-council-publishes-card-production-security-requirements/</loc><lastmod>2013-05-10T08:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/28/survey-reveals-companies-are-taking-risks-whilst-outsouring-consumer-data/</loc><lastmod>2013-03-27T16:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/03/26/rsas-march-online-fraud-report-2013-with-a-focus-on-email-and-identity-takeover/</loc><lastmod>2013-03-26T09:40:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/03/20/sometimes-it-is-a-good-idea-to-have-in-house-skills/</loc><lastmod>2013-03-20T18:31:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/03/18/merchant-sues-visa-biting-the-hand-that-feeds-you/</loc><lastmod>2013-03-18T10:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/03/12/receptionist-prosecuted-for-breaching-the-data-protection-act/</loc><lastmod>2013-04-10T15:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/03/12/an-update-on-the-progress-of-the-european-data-protection-act/</loc><lastmod>2013-03-12T10:48:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/03/08/lack-of-guidance-on-byod-raises-data-protection-concerns-2/</loc><lastmod>2013-03-08T10:49:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/03/01/the-growing-threat-of-insider-fraud-not-a-top-security-priority-for-organizations/</loc><lastmod>2013-09-26T13:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/27/what-happens-after-a-data-breach/</loc><lastmod>2013-02-27T16:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/27/big-data-analytics-can-improve-it-security-defences/</loc><lastmod>2013-02-27T09:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/25/how-employees-are-putting-your-intellectual-property-at-risk/</loc><lastmod>2013-02-25T13:40:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/22/rsas-february-online-fraud-report-2013-including-an-update-on-phishing-activity/</loc><lastmod>2013-02-22T20:53:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/22/how-the-british-have-changed-the-way-they-spend-their-money-over-the-last-decade/</loc><lastmod>2013-02-22T12:08:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/21/more-than-12-million-identity-fraud-victims-in-2012-study-finds/</loc><lastmod>2013-02-21T13:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/19/mobile-phone-users-are-not-concerned-with-security-until-there-is-a-breach-and-then-they-blame-their-provider/</loc><lastmod>2013-02-19T16:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/18/card-not-present-cnp-fraud-fall-57-since-2010/</loc><lastmod>2013-02-18T11:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/16/nursing-and-midwifery-council-fined-for-breaching-the-data-protection-act/</loc><lastmod>2013-02-16T10:44:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/14/pci-ssc-releases-guidance-for-merchants-on-mobile-payment-acceptance-security/</loc><lastmod>2013-02-14T18:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/08/securing-patient-data-has-improved-massively-but-still-has-work-to-do/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2013/02/infographic_-the-security-of-patient-data-in-a-virtual-universe3.jpg</image:loc><image:title>Infographic_-The-security-of-patient-data-in-a-virtual-universe3</image:title></image:image><lastmod>2013-02-08T12:43:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/07/pci-ssc-releases-pci-dss-cloud-computing-guidelines/</loc><lastmod>2013-02-07T16:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/31/pci-ssc-releases-its-best-practices-to-help-prevent-card-data-compromise-at-atms/</loc><lastmod>2013-02-07T16:08:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/02/01/pci-ssc-releases-its-pci-dss-e-commerce-security-guidelines/</loc><lastmod>2013-02-07T16:08:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/30/eu-commission-proposes-a-comprehensive-reform-of-the-data-protection-rules/</loc><lastmod>2013-01-30T14:39:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/30/rsas-january-online-fraud-report-2013-including-an-excellent-summary-of-phishing-in-2012/</loc><lastmod>2014-01-02T22:16:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/28/top-20-most-trusted-companies-for-privacy-2012/</loc><lastmod>2013-01-28T20:22:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/26/the-information-commissioner-provides-an-update-on-the-european-data-protection-act/</loc><lastmod>2013-01-26T14:08:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/25/2013-looks-like-being-a-bigger-year-than-2012-as-the-ico-starts-catching-up-with-the-backlog-of-breaches/</loc><lastmod>2013-01-25T16:23:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/25/europol-reveals-e1-5-billion-euro-in-credit-card-fraud-how-it-is-stolen-and-why-they-struggle-to-catch-the-criminals/</loc><lastmod>2014-01-02T22:15:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/21/2012-saw-a-5-increase-in-fraud/</loc><lastmod>2013-01-21T10:19:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/09/want-to-be-pci-dss-compliant-here-are-5-mistakes-to-avoid/</loc><lastmod>2013-01-09T16:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/04/2012-a-year-of-identity-fraud-a-review-by-experian/</loc><lastmod>2013-01-04T16:38:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2013/01/03/rsas-december-online-fraud-report-2012-including-an-excellent-piece-on-ransomware/</loc><lastmod>2013-01-03T13:08:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/12/31/rsas-november-online-fraud-report-2012-including-advice-on-avoiding-fraud/</loc><lastmod>2012-12-31T11:55:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/12/29/2012-was-a-big-year-for-the-data-protection-act-with-record-fines-and-breaches-see-the-full-2012-list-here/</loc><lastmod>2013-09-27T13:29:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/12/20/6-experts-predict-the-it-security-and-compliance-issues-and-trends-for-2013/</loc><lastmod>2013-01-13T15:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/12/19/what-will-fraud-look-like-in-2013/</loc><lastmod>2012-12-19T14:21:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/12/09/new-figures-show-spread-of-audacious-telephone-scam-targeting-cardholders-pin/</loc><lastmod>2012-12-14T05:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/11/07/the-average-cost-of-a-data-breach-is-8-9m-in-the-us-and-2-1m-in-the-uk/</loc><lastmod>2012-11-09T10:35:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/11/06/the-top-25-worst-passwords/</loc><lastmod>2012-11-06T20:56:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/11/06/the-prudential-is-fined-50000-for-breaching-the-data-protection-act/</loc><lastmod>2012-11-06T14:18:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/10/02/cloud-maturity-study-reveals-the-top-10-issues-eroding-cloud-confidence-2/</loc><lastmod>2012-10-31T16:05:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/10/25/rsas-october-online-fraud-report-2012-including-summary-of-phishing-and-social-networking/</loc><lastmod>2012-10-25T16:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/10/17/one-in-four-consumers-are-victims-of-card-fraud-new-study-reveals/</loc><lastmod>2012-10-17T08:28:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/10/11/overall-the-uk-needs-to-improve-its-approach-to-the-data-protection-act/</loc><lastmod>2012-10-11T09:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/28/information-commissioner-publishes-guidance-on-cloud-computing/</loc><lastmod>2012-09-28T09:49:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/24/rsas-september-online-fraud-report-2012-including-a-summary-of-rogue-mobile-apps/</loc><lastmod>2012-09-24T09:51:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/19/pci-sscs-insights-on-mobile-encryption-and-payment-security-following-the-north-american-community-meeting/</loc><lastmod>2012-09-19T11:51:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/19/data-protection-advice-for-schools-and-just-about-everyone-else/</loc><lastmod>2012-09-19T08:19:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/15/feedback-requested-from-pci-community-on-best-practices-to-help-prevent-card-data-compromise-at-atms/</loc><lastmod>2012-09-16T20:55:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/11/almost-50-of-organizations-report-10-or-more-significant-data-breaches-a-year/</loc><lastmod>2012-09-14T08:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/14/pci-security-standards-council-releases-best-practices-for-mobile-software-developers/</loc><lastmod>2012-09-14T08:34:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/13/the-average-cost-of-a-breach-event-is-7-2-million-or-214-per-compromised-record/</loc><lastmod>2012-09-13T13:39:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/11/rubbish-causes-a-breach-of-the-data-protection-act-and-a-250000-fine/</loc><lastmod>2012-09-11T11:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/11/four-things-you-need-to-know-about-risk-analysis/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/09/ide-logo.jpg</image:loc><image:title>ide-logo</image:title></image:image><lastmod>2012-09-11T09:06:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/09/09/pci-security-standard-council-releases-summary-of-feedback-on-pci-standards/</loc><lastmod>2012-09-09T15:02:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/30/advance-malware-threats-are-growing-at-an-alarming-rate/</loc><lastmod>2012-08-30T12:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/29/an-overview-of-eu-security-legislation-and-the-impact-of-cyber-incident-reporting/</loc><lastmod>2012-08-29T08:38:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/28/rsas-august-online-fraud-report-2012-including-a-summary-of-fraud-as-a-service-faas/</loc><lastmod>2012-09-10T22:29:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/24/65-of-businesses-do-not-protect-their-customers-private-data/</loc><lastmod>2012-09-09T08:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/23/counting-the-cost-of-e-crime-to-retailer-actually-its-205-4-million-a-year/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/08/counting_the_cost_of_e-crime_page_1.jpg</image:loc><image:title>Counting_the_cost_of_e-crime_Page_1</image:title></image:image><lastmod>2012-08-24T07:25:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/15/pci-security-standards-councils-qualified-integrators-and-resellers-program-is-now-live/</loc><lastmod>2012-08-15T13:45:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/10/who-is-responsible-for-data-protection-in-the-cloud/</loc><lastmod>2012-09-03T08:14:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/08/the-information-commissioners-5-tips-on-how-to-better-protect-personal-information/</loc><lastmod>2012-08-08T11:56:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/06/torbay-care-trust-nhs-fined-175000-for-breaching-the-data-protection-act/</loc><lastmod>2012-08-06T12:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/08/03/pci-security-standards-council-internal-security-assessor-isa-training-now-available-as-an-elearning-course/</loc><lastmod>2014-11-20T13:36:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/07/27/information-commissioners-reaction-to-google-and-their-retention-of-street-view-data/</loc><lastmod>2012-07-27T16:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/07/27/rsas-july-online-fraud-report-2012/</loc><lastmod>2012-07-27T10:48:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/07/25/a-new-report-indicates-that-uk-fraud-has-fallen-by-50-in-the-last-12-months/</loc><lastmod>2012-07-25T09:03:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/07/16/criminal-logic-follow-the-money-and-find-easy-targets/</loc><lastmod>2012-07-16T12:25:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/06/29/pci-security-standards-council-releases-point-to-point-encryption-p2pe-resources/</loc><lastmod>2012-06-29T09:05:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/06/25/network-barometer-report-2012-a-dimension-datas-report/</loc><lastmod>2012-06-25T13:25:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/06/21/the-state-of-risk-based-security-management/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/06/tripwire-malicous-2.png</image:loc><image:title>tripwire malicous 2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/06/tripwire-malicious-activity.png</image:loc><image:title>Tripwire malicious activity</image:title></image:image><lastmod>2012-06-21T12:52:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/06/20/rsas-june-online-fraud-report-2012/</loc><lastmod>2012-06-20T15:45:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/06/08/consumers-express-their-opinions-of-data-breach-notifications/</loc><lastmod>2012-06-08T14:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/06/01/latest-nhs-fine-for-breaching-the-data-protection-act-is-close-to-the-current-limit-at-325000/</loc><lastmod>2013-01-01T02:54:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/31/information-commissioners-office-consults-on-new-anonymisation-code-of-practice/</loc><lastmod>2012-05-31T14:21:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/30/database-security-and-siem-are-the-top-risk-and-compliance-converns/</loc><lastmod>2012-05-30T09:23:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/24/2354/</loc><lastmod>2012-05-24T20:22:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/24/survey-99-rate-security-is-a-major-consideration-when-choosing-the-cloud/</loc><lastmod>2012-05-24T14:34:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/21/no-nhs-fines-for-breaching-the-data-protection-act-then-two-come-along-in-quick-succession/</loc><lastmod>2012-05-21T10:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/16/guidance-for-merchants-on-how-to-securely-accept-mobile-payments/</loc><lastmod>2012-05-16T16:42:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/16/the-good-old-fashion-way-to-breach-the-data-protection-act-lose-some-paperwork/</loc><lastmod>2012-05-16T11:22:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/10/pci-security-standards-council-announces-qualified-integrators-and-resellers-certification-program/</loc><lastmod>2014-05-24T13:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/09/uk-fraud-report-2012/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/05/blog-experisn-id-fraud-report-2012_page_01.jpg</image:loc><image:title>Blog Experisn ID fraud-report-2012_Page_01</image:title></image:image><lastmod>2012-05-09T10:11:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/04/rsas-april-online-fraud-report-2012/</loc><lastmod>2012-09-18T03:59:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/05/01/may-is-scam-awareness-month/</loc><lastmod>2012-05-26T19:05:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/04/30/information-commissioner-finally-fines-the-nhs-for-a-breach-of-the-data-protection-act/</loc><lastmod>2012-04-30T14:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/04/27/pci-point-to-point-encryption-solution-requirements-and-testing-procedures-v1-1/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/04/p2pe-at-a-glance.png</image:loc><image:title>P2PE at a glance</image:title></image:image><lastmod>2012-04-27T16:19:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/04/11/the-pci-ssc-has-opened-its-registration-for-the-2012-pci-community-meetings/</loc><lastmod>2012-04-11T07:31:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/29/2012-application-security-gap-study-a-survey-of-it-security-developers/</loc><lastmod>2012-03-29T06:35:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/28/pci-security-standards-council-pushing-for-feedback-as-window-starts-to-close/</loc><lastmod>2012-03-28T20:36:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/27/2000-lost-medical-records-leads-to-an-investigation-by-the-information-commissioner/</loc><lastmod>2012-03-27T17:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/27/verizon-2012-data-breach-investigation-report-a-summary/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/03/verizon-pci-stats-2011.png</image:loc><image:title>verizon PCI stats 2011</image:title></image:image><lastmod>2012-03-27T17:19:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/26/uk-card-fraud-losses-fall-because-of-technology-and-risk-awareness/</loc><lastmod>2012-03-26T14:25:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/26/rsas-march-online-fraud-report/</loc><lastmod>2012-03-26T09:50:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/14/police-fined-by-the-information-commissioner-if-the-police-can-lose-sensitive-that-then-anyone-can/</loc><lastmod>2012-03-25T16:07:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/23/pci-security-standards-council-continues-focus-on-mobile-payment-acceptance-security/</loc><lastmod>2012-03-23T16:12:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/12/rsas-february-online-fraud-report/</loc><lastmod>2012-03-12T13:44:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/28/personal-information-is-under-threat-from-social-engineering/</loc><lastmod>2012-03-02T08:14:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/03/02/school-boy-error-at-a-university/</loc><lastmod>2012-03-02T08:11:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/21/pci-ssc-announces-formal-training-in-europe-london/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/02/pci-ssc1.png</image:loc><image:title>PCI SSC</image:title></image:image><lastmod>2012-02-21T08:03:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/16/is-the-information-commissioner-having-a-purge-on-breaches/</loc><lastmod>2012-02-16T11:04:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/13/another-bad-day-for-councils-but-this-time-there-were-costs-attached-180000/</loc><lastmod>2012-02-13T11:26:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/10/bad-day-at-the-office-for-uk-councils-as-several-breach-the-data-protection-act/</loc><lastmod>2012-02-10T13:31:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/09/report-on-malware-activity-for-the-last-6-months-2011-m86/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/02/m86.jpg</image:loc><image:title>m86</image:title></image:image><lastmod>2012-02-09T09:40:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/08/pci-security-standards-council-invites-payments-community-to-input-on-pin-transaction-security/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/02/pci-ssc.png</image:loc><image:title>pci ssc</image:title></image:image><lastmod>2012-02-08T09:38:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/07/paypal-payments-and-pci/</loc><lastmod>2014-12-26T05:11:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/03/etrade-securities-ltd-falls-foul-of-the-ico-after-losing-customer-records/</loc><lastmod>2012-02-03T11:30:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/02/02/fortnum-and-mason-fail-pci-dss-requirements-after-a-phone-call/</loc><lastmod>2012-02-02T21:20:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/30/council-fined-140000-for-five-serious-data-breaches/</loc><lastmod>2012-01-30T13:24:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/29/aftermath-of-a-data-breach-a-study-report/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/01/ponemon.png</image:loc><image:title>ponemon</image:title></image:image><lastmod>2012-01-29T22:27:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/27/rsas-january-2012-online-fraud-report/</loc><lastmod>2012-01-27T15:18:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/27/rsas-december-online-fraud-report/</loc><lastmod>2012-01-27T15:14:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/07/rsas-november-online-fraud-report/</loc><lastmod>2012-01-27T14:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/27/european-privacy-day-2012-28th-january/</loc><lastmod>2012-01-27T13:51:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/26/cybersources-2012-uk-online-fraud-report/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/01/cybersource-threat-by-vector.png</image:loc><image:title>Cybersource threat by Sector</image:title></image:image><lastmod>2012-01-26T10:10:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/25/data-protection-breach-readiness-guide/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/01/ota.png</image:loc><image:title>ota</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/01/ota.gif</image:loc><image:title>ota</image:title></image:image><lastmod>2012-01-25T15:49:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/19/fraud-could-be-costing-uk-hotels-over-2-billion-a-year/</loc><lastmod>2012-01-20T22:59:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/20/lose-memory-stick-go-straight-to-court-do-not-pass-go-and-do-collect-damage-to-reputation/</loc><lastmod>2012-01-20T12:28:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/17/health-worker-convicted-of-obtaining-patient-details-unlawfully/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2012/01/liverpool-hospital.png</image:loc><image:title>liverpool hospital</image:title></image:image><lastmod>2012-01-18T00:32:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2012/01/10/security-is-still-the-biggest-technology-challenge-for-retailers/</loc><lastmod>2012-02-07T15:25:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/21/eight-ways-to-reduce-pci-dss-audit-scope-by-tokenizing-cardholder-data/</loc><lastmod>2012-01-03T10:08:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/30/data-security-survey-to-gauge-organisations-perception-of-their-own-it-security/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/12/hitachi-infograph1.png</image:loc><image:title>Hitachi infograph</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/12/hitachi-infograph.png</image:loc><image:title>Hitachi infograph</image:title></image:image><lastmod>2011-12-30T12:54:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/20/7-experts-predict-the-it-security-and-compliance-issues-and-trends-of-2012/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/12/laptop-malware-data-safe.jpg</image:loc><image:title>Laptop-Malware-Data-Safe</image:title></image:image><lastmod>2011-12-20T13:48:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/17/illicit-access-of-medical-records-leads-to-a-breach-of-the-data-protection-act/</loc><lastmod>2011-12-17T14:48:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/15/clarification-give-on-private-email-details-and-the-freedom-of-information-act/</loc><lastmod>2011-12-15T13:32:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/13/websites-failing-cookie-regulations/</loc><lastmod>2011-12-13T18:09:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/12/last-chance-to-review-your-pci-readiness-before-the-holiday-season/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/12/christmas-credit-card1.jpg</image:loc><image:title>christmas credit card</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/12/christmas-credit-card.jpg</image:loc><image:title>christmas credit card</image:title></image:image><lastmod>2011-12-12T13:18:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/06/pci-security-standards-council-adds-pci-pin-security-requirements-to-pts-standard/</loc><lastmod>2011-12-10T10:56:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/06/information-commissioner-gets-tough-with-the-largest-fine-for-the-breach-of-the-data-protection-act/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/12/powys.gif</image:loc><image:title>powys</image:title></image:image><lastmod>2011-12-07T00:14:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/05/internet-regulation-government-plans-for-managing-and-monitoring-of-the-internet/</loc><lastmod>2011-12-05T15:23:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/12/02/estate-agent-prosecuted-for-not-disclosing-he-stored-personal-data/</loc><lastmod>2011-12-06T16:41:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/30/combating-cybercrime-to-protect-organisations/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/11/pwc-cybercrime-report-2011_page_011.jpg</image:loc><image:title>PWC Cybercrime report 2011_Page_01</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/11/pwc-cybercrime-report-2011_page_01.jpg</image:loc><image:title>PWC Cybercrime report 2011_Page_01</image:title></image:image><lastmod>2011-12-07T11:04:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/28/information-commissionerr-fines-two-councils-for-emailing-personal-information/</loc><lastmod>2011-12-03T18:27:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/27/rsas-october-online-fraud-report/</loc><lastmod>2011-12-09T11:19:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/27/rsas-september-online-fraud-report/</loc><lastmod>2011-12-03T19:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/24/the-freedom-of-information-act-power-to-the-people-or-a-tool-for-busy-bodies/</loc><lastmod>2011-12-09T12:09:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/22/the-u-s-leads-the-world-in-credit-card-fraud/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/11/nilson-report.png</image:loc><image:title>nilson report</image:title></image:image><lastmod>2011-12-15T05:34:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/21/7200-peoples-personal-information-which-were-discovered-in-a-skip/</loc><lastmod>2011-12-03T18:55:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/16/qc-has-unencrypted-laptop-stolen-and-is-sanctioned-by-the-ico/</loc><lastmod>2011-11-30T21:33:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/16/big-increase-in-communications-fraud/</loc><lastmod>2011-12-01T18:04:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/15/pci-security-standards-council-announces-winners-of-special-interest-group-elections/</loc><lastmod>2011-12-03T16:19:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/11/reputation-damage-could-cost-more-than-pci-compliance-or-data-protection-act-fines/</loc><lastmod>2011-12-07T06:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/11/only-21-of-merchants-were-compliant-and-other-startling-pci-dss-facts-from-the-coal-face/</loc><lastmod>2011-12-22T21:36:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/10/gambling-takes-on-a-new-meaning-when-someone-steals-your-personal-information/</loc><lastmod>2011-12-03T21:22:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/07/midata-kicks-off-with-support-of-government-and-businesses/</loc><lastmod>2011-12-03T19:09:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/04/council-breaches-the-data-protection-act-by-losing-a-memory-stick/</loc><lastmod>2011-11-28T13:52:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/04/uk-cards-association-warns-of-growing-credit-card-fraud-phone-scam-targeting-the-over-60s/</loc><lastmod>2011-11-04T09:05:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/11/01/pci-security-standards-council-invites-industry-input-during-next-phase-of-standards-development/</loc><lastmod>2011-11-01T17:04:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/31/who-fell-foul-of-the-information-commissioner-in-october/</loc><lastmod>2011-10-31T14:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/28/newcastle-youth-offending-team-breached-the-data-protection-act-after-theft-of-an-unencrypted-laptop/</loc><lastmod>2011-10-28T11:57:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/27/calls-for-tougher-penalties-for-breaches-of-the-data-protection-act/</loc><lastmod>2011-10-27T12:19:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/26/students-are-concerned-that-information-online-might-affect-their-careers/</loc><lastmod>2011-10-29T20:55:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/26/the-10-ten-early-warning-signs-of-fraud-in-organisations/</loc><lastmod>2011-10-26T09:25:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/25/advice-for-small-businesses-on-how-to-avoid-identity-theft/</loc><lastmod>2011-11-08T01:15:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/24/pci-security-standards-council-opens-election-for-new-special-interest-groups/</loc><lastmod>2011-10-24T14:25:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/24/information-commissioner-businesses-%e2%80%98waking-up%e2%80%99-to-data-protection-responsibilities/</loc><lastmod>2011-10-24T10:02:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/24/housing-group-breaches-the-data-protection-act-by-emailing-a-spreadsheet/</loc><lastmod>2011-10-24T07:59:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/15/pci-ssc-updates-pts-program-for-encryption-and-mobile/</loc><lastmod>2011-10-15T10:06:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/14/security-should-not-be-viewed-as-an-isolated-activity/</loc><lastmod>2011-10-14T16:45:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/14/disclosure-rules-clarified-or-made-more-confusing/</loc><lastmod>2012-01-15T06:50:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/13/information-commissioner-calls-for-powers-to-conduct-compulsory-data-protection-audits/</loc><lastmod>2011-10-13T10:01:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/12/hotel-association-to-create-unified-security-standards-for-credit-card-payments/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/10/hotel.jpg</image:loc><image:title>hotel</image:title></image:image><lastmod>2011-10-30T06:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/12/merchants-are-complacent-about-pci-dss-report-reveals/</loc><lastmod>2011-11-18T05:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/07/the-huge-and-unexpected-administrative-costs-of-a-data-breach/</loc><lastmod>2011-10-07T11:01:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/05/uk-card-association-offers-advice-on-avoiding-fraud/</loc><lastmod>2011-10-05T16:11:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/05/card-fraud-and-online-banking-fraud-down-but-cheque-and-phone-banking-fraud-up/</loc><lastmod>2011-10-05T15:52:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/05/education-education-education-but-when-will-people-learn-encrypt-your-data-as-two-more-education-establishments-lose-data/</loc><lastmod>2011-10-05T14:30:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/04/hospital-destroys-10000-archived-records-in-data-breach/</loc><lastmod>2011-10-04T15:33:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/10/04/information-commissioner-issues-guidance-on-giving-access-to-information-held-in-complaint-files/</loc><lastmod>2011-10-04T06:04:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/29/10-identity-management-metrics-that-matter/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/09/identropy.png</image:loc><image:title>identropy</image:title></image:image><lastmod>2011-09-29T19:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/23/travel-sector-suffering-more-than-most-from-credit-card-fraud/</loc><lastmod>2011-09-23T12:32:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/20/the-majority-of-adults-are-worried-about-possible-exposure-of-their-personal-information/</loc><lastmod>2011-09-20T12:05:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/19/pci-ssc-publishes-its-first-set-of-pci-point-to-point-encryption-solution-requirements/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/09/bob-russo.png</image:loc><image:title>bob russo</image:title></image:image><lastmod>2011-09-19T14:41:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/19/six-years-of-data-breaches-including-the-top-10-largest-breaches/</loc><lastmod>2011-10-01T19:49:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/19/cios-optimistic-about-information-security/</loc><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/09/pwclogo2.jpg</image:loc><image:title>pwclogo2</image:title></image:image><image:image><image:loc>https://brianpennington.co.uk/wp-content/uploads/2011/09/pwclogo.gif</image:loc><image:title>pwclogo</image:title></image:image><lastmod>2011-09-19T08:11:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/18/test-your-it-security-and-id-theft-knowledge/</loc><lastmod>2011-12-13T05:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/16/ico-takes-action-against-the-child-exploitation-and-online-protection-centre-and-the-serious-organised-crime-agency/</loc><lastmod>2011-09-16T12:18:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/08/who-has-the-information-commissioner-caught-in-the-last-3-months/</loc><lastmod>2011-09-15T11:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/12/merchants-are-more-concerned-about-their-brand-than-pci-fines/</loc><lastmod>2011-09-12T13:23:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/11/five-ways-to-fall-victim-to-credit-card-fraud/</loc><lastmod>2011-09-11T12:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/10/fbi-releases-bank-crime-statistics-for-second-quarter-of-2011/</loc><lastmod>2011-09-10T10:20:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/09/13-of-britains-are-casual-hackers-and-16-have-been-hacked/</loc><lastmod>2011-12-06T02:43:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/02/9-steps-to-take-if-your-credit-card-data-is-hacked/</loc><lastmod>2011-09-02T09:29:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/01/how-advanced-attacks-succeed-despite-20b-spend-on-enterprise-it-security/</loc><lastmod>2011-12-16T05:45:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/09/01/pci-dss-updated-guidelines-for-wifi-and-new-guidance-on-bluetooth/</loc><lastmod>2011-09-01T11:35:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/31/information-rights-should-be-embedded-in-schools-says-ico/</loc><lastmod>2011-08-31T13:03:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/31/rsas-august-online-fraud-report/</loc><lastmod>2011-08-31T12:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/31/conflicker-is-still-the-most-common-virus/</loc><lastmod>2011-08-31T09:39:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/25/an-insurers-perspective-of-cyber-crime/</loc><lastmod>2011-08-25T13:22:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/23/which-tips-for-online-banking/</loc><lastmod>2011-08-23T09:45:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/22/pci-security-standards-council-exceeds-100-members-in-europe/</loc><lastmod>2013-09-02T19:35:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/18/exactly-how-many-merchants-are-pci-dss-compliant/</loc><lastmod>2011-08-18T10:31:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/17/good-news-for-merchants-as-the-pci-security-standards-council-releases-tokenization-guidance/</loc><lastmod>2011-08-17T09:13:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/16/most-small-business-owners-do-not-treat-fraud-as-a-top-priority-survey-results/</loc><lastmod>2012-01-16T13:02:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/08/11/the-ico-judgment-on-lush-after-the-breach-of-5000-peoples-bank-details/</loc><lastmod>2011-08-12T09:27:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/18/could-you-save-50-on-the-cost-of-your-firewall-change-requests/</loc><lastmod>2012-08-29T14:05:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/13/rsas-june-online-fraud-report/</loc><lastmod>2011-07-13T09:03:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/12/pci-compliance-cost-calculator-for-level-1-4-retailers/</loc><lastmod>2012-01-16T18:39:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/12/business-under-threat-as-uk-fraud-exceeds-1bn-kpmg-research/</loc><lastmod>2012-02-03T18:04:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/11/symantec-messagelabs-june-2011-intelligence-report/</loc><lastmod>2011-07-11T13:04:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/10/symantecs-may-2011-intelligence-report/</loc><lastmod>2011-07-10T11:59:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/08/best-practice-guidelines-for-enterprises-an-it-security-guide/</loc><lastmod>2011-07-08T09:48:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/05/top-10-tips-to-avoid-the-information-commissioner%e2%80%99s-wrath/</loc><lastmod>2011-07-05T09:38:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/01/email-attacks-this-time-it%e2%80%99s-personal/</loc><lastmod>2011-07-01T14:44:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/07/01/emc-has-a-good-idea-of-who-was-behind-rsa-breach/</loc><lastmod>2011-07-01T11:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/06/30/90-percent-of-businesses-fell-victim-to-a-cyber-security-breach/</loc><lastmod>2012-01-19T19:27:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/06/29/how-to-contact-the-credit-reporting-agencies-to-place-a-fraud-alert/</loc><lastmod>2011-10-05T20:15:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/06/16/how-to-secure-mobile-devices/</loc><lastmod>2011-07-07T15:27:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/06/02/network-barometer-report-2011-dimension-datas-annual-report/</loc><lastmod>2011-07-01T15:41:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/31/the-state-of-data-security-a-report-by-sophos/</loc><lastmod>2011-05-31T08:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/26/serious-disconnect-between-businesses-and-mobile-users/</loc><lastmod>2011-06-24T21:12:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/25/25-of-mobile-network-operators-are-not-pci-dss-compliant/</loc><lastmod>2011-10-05T20:17:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/24/fraudsters-steal-1-4-billion-from-airlines/</loc><lastmod>2011-05-24T09:15:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/23/pci-standards-council-announces-new-board-of-advisors/</loc><lastmod>2011-05-23T12:44:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/19/mobile-device-vulnerabilities-at-an-all-time-high/</loc><lastmod>2012-03-12T07:01:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/18/a-short-history-of-android-security-issues/</loc><lastmod>2011-05-19T14:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/17/global-threat-report-quarter-1-2011/</loc><lastmod>2011-05-17T08:18:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/13/ecrime-trends-report-q1-2011-phishing-up-rustock-down/</loc><lastmod>2011-05-13T10:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/05/12/pci-compliance-risks-for-small-merchants-and-where-they-are-failing/</loc><lastmod>2013-09-19T21:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/28/consumers%e2%80%99-reaction-to-online-fraud/</loc><lastmod>2011-04-28T11:35:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/27/identity-theft-resource-center-found-that-hacking-accounted-for-the-largest-number-of-breaches-in-2011-year-to-date/</loc><lastmod>2011-04-27T15:53:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/27/symantec-messagelabs-april-2011-intelligence-report/</loc><lastmod>2011-04-27T08:17:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/26/symantec-messagelabs-march-2011-intelligence-report/</loc><lastmod>2011-04-26T21:04:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/26/phishing-the-uk-banking-losses/</loc><lastmod>2011-04-26T14:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/26/fraud-intelligence-report-first-quarter-2011/</loc><lastmod>2011-04-26T11:09:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/21/pci-dss-compliance-trends-study-2011/</loc><lastmod>2011-04-21T12:55:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/21/cyber-criminals-shifting-to-smaller-more-opportunistic-attacks-external-attacks-especially-hacking-on-rise/</loc><lastmod>2011-04-21T09:57:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/12/call-centre-security-and-pci-compliance/</loc><lastmod>2012-05-24T20:22:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/04/epsilon-admits-to-a-data-breach-that-could-affect-millions/</loc><lastmod>2011-04-04T14:08:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/04/01/smartphone-users-at-risk-of-id-fraud/</loc><lastmod>2011-04-01T14:09:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/31/comparison-of-cost-of-ownership-between-in-house-and-managed-pay/</loc><lastmod>2011-03-31T16:14:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/22/how-to-choose-a-qsa-sans/</loc><lastmod>2011-05-13T14:29:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/21/cybersource-brings-worlds-largest-fraud-detection-radar-to-online-merchants/</loc><lastmod>2011-03-21T19:16:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/18/pci-council-releases-guidance-for-protecting-telephone-based-payment-card-data/</loc><lastmod>2011-03-21T08:10:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/14/benefits-of-pci-compliance-%e2%80%93-direct-and-indirect/</loc><lastmod>2011-12-13T15:11:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/13/cloud-computing-risk-assessment-from-enisa/</loc><lastmod>2012-06-04T12:26:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/11/botnets-10-tough-questions-downloadable-document/</loc><lastmod>2011-03-11T12:16:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/09/pci-ssc-board-of-advisors-2011-elections-are-now-open/</loc><lastmod>2011-03-09T18:02:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/09/fraud-losses-drop-on-uk-cards-cheques-and-online-banking/</loc><lastmod>2011-03-09T14:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/07/75-of-hospitality-sector-mistakenly-believe-they-are-pci-compliant/</loc><lastmod>2011-05-13T14:53:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/03/02/where-do-security-breaches-occur-what-type-of-data-is-stolen-and-who-makes-the-discovery/</loc><lastmod>2011-03-02T17:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/25/lush-cosmetics-is-once-again-trading-online/</loc><lastmod>2011-02-25T16:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/21/card-payments-roadmap-in-the-u-s-how-will-emv-impact-the-future-payments-infrastructure-smart-card-alliance/</loc><lastmod>2011-02-21T16:11:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/18/pci-awareness-training-%e2%80%93-official-courses-are-now-available/</loc><lastmod>2011-09-29T00:04:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/17/downloadable-cybersource%e2%80%99s-report-on-uk-online-fraud-2011/</loc><lastmod>2011-02-17T12:04:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/16/29-of-credit-card-holders-hit-by-fraud-as-global-fraud-rises/</loc><lastmod>2011-02-16T11:04:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/15/lush-confirm-their-australian-website-has-been-hacked/</loc><lastmod>2011-02-15T15:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/15/eight-must-fix-flaws-prior-to-an-application-penetration-test/</loc><lastmod>2011-02-15T09:24:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/14/wells-fargo-offers-online-and-mobile-fraud-prevention-tips/</loc><lastmod>2011-02-14T12:32:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/12/14-arrested-for-credit-card-fraud/</loc><lastmod>2011-02-14T11:47:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/13/top-5-riskiest-places-to-use-your-credit-card-b2b-news/</loc><lastmod>2011-10-03T15:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/12/risk-of-identity-theft-in-hotel-declines-usatoday-com/</loc><lastmod>2011-02-12T10:23:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/11/low-security-awareness-found-across-it/</loc><lastmod>2011-02-11T14:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/10/mcafee-cto-warns-of-new-combined-threat-named-night-dragon-sc-magazine-uk/</loc><lastmod>2011-02-10T13:45:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/09/information-commissioners-office-issues-third-and-fourth-fines-to-ealing-and-hounslow-councils-over-loss-of-unencrypted-laptops/</loc><lastmod>2011-10-15T11:00:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/07/pci-fines-could-put-merchants-out-of-business/</loc><lastmod>2011-02-07T17:35:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk/2011/02/05/the-majority-of-stolen-credit-cards-stop-being-used-after-24-hours/</loc><lastmod>2011-02-05T17:40:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://brianpennington.co.uk</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-30T11:10:35+00:00</lastmod></url></urlset>
