Brian Pennington
About Brian Pennington
Cyber Security Statistics
Cybersecurity and the Supply Chain
Cybersecurity for OT, IIoT and IoT
PCI DSS
Malware
Top 10 cyber security stories of 2025
The continuing threat from email based attacks
The most common Phishing Attacks in one simple Infographic from KnowBe4
Which countries account for the most hacking?
A Cybersecurity Glossary with explanations of the terms and abbreviations
Breaches caused by either hacking or malware nearly doubled in relative frequency
Are British Businesses over confident about the threat of data breaches?
Payment Card Industry issues new guidance to help organizations respond to data breaches
Cost of Phishing and Value of Employee Training
Top 5 Strategic Infosec issues in Higher Education
Tor detections jump by more than 1,000%
Workers Ignoring Known Cyber Risks, Surfing Adult Content and Downloading Unapproved Apps
The history of mobile threats, 2004 to 2015
Mobile Insecurity as an Infographic
Reducing Cyber Risk; Marine transportation system Cybersecurity standards, liability protection and Cyber Insurance
BlackEnergy malware threat has some cybersecurity experts uneasy
THE MANY FACES OF HACKERS: The Personas to Defend Against
Cyber Attacks on U.S. Companies in 2014
Mobile Malware up 68% in 6 months
Point of Sale Malware and the 7 stages of an attack.
1
2
3
Next Page
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here:
Cookie Policy
Subscribe
Subscribed
Brian Pennington
Join 158 other subscribers
Sign me up
Already have a WordPress.com account?
Log in now.
Brian Pennington
Subscribe
Subscribed
Sign up
Log in
Report this content
View site in Reader
Manage subscriptions
Collapse this bar