Your Search Results
Your search results for ‘list of data breaches’ returned 486 results
Cloud Security
...legal and regulatory compliance obligations. For instance, the DPA (Data Protection Act) 2018 and GDPR (General Data Protection Regulation) apply to the processing of personal data regardless of where that...

IT Governance Podcast 2023-4: EU-US Data Privacy Framework, Twitter 2FA, GoDaddy, HardBit 2.0
This week, we discuss the European Parliament Committee on Civil Liberties’s opinion of the EU-US Data Privacy Framework, Twitter’s decision to disable free text-based 2FA, a series of attacks on...

How to Easily Meet the PCI DSS Awareness Training Requirements
All organisations that transmit, process or store payment card data, or affect its security, must meet the requirements of the PCI DSS (Payment Card Industry Data Security Standard). The currently...

Risk Management under the DORA Regulation
...2021(Q2–Q4) 2022(Q2–Q4) Data breaches 855 752 (-12%) 630 (-16%) 648 (+3%) Cyber attacks 143 245 (+71%) 230 (-6%) 285 (+23%) Note 1: The ICO data set only provides the numbers...
The PECR and EU ePrivacy Directive
...this means providers need to comply only with the PECR’s requirements relating to: Security and security breaches; Traffic data; Location data; Itemised billing; and Line identification services. However, some service...

Understanding the CIA Triad: A Cornerstone of Cyber Security
...accessed only by authorised parties. Integrity: Protecting data from unauthorised modification to ensure accuracy and trustworthiness. Availability: Making sure data and systems are accessible when needed by authorised users. Watch...
ISO 27017 and ISO 27018 Cloud Security
...critical – especially if you use them to process personal or sensitive information and must comply with data protection laws such as the GDPR (General Data Protection Regulation) and DPA...
DPO as a Service Case Study
...their customers but requires strict monitoring from a data protection standpoint. It was clear to MyC’s founders when starting up that data protection was going to be integral to the...