Your Search Results
Your search results for ‘list of data breaches’ returned 486 results

The GDPR – Key principles
The EU General Data Protection Regulation (GDPR) superseded all previous European data protection laws governing how organisations process personal data. In the UK, the UK GDPR and Data Protection Act...
ePrivacy Regulation EPR
...lawful basis for processing electronic communications metadata also proves contentious. On 25 May 2018, the EDPB (European Data Protection Board) released its Statement on the revision of the ePrivacy Regulation...

A Guide to the EU GDPR’s Requirements for an EU Representative
This country’s post-Brexit data protection regime, the UK GDPR (General Data Protection Regulation), requires non-UK organisations that process UK residents’ personal data to appoint a representative in the UK. In...

How Do the Cyber Essentials and Cyber Essentials Plus Assessments Work?
...to fill in the asset list template before their pre-engagement call [we send this template in the pre-engagement call invitation]. From that asset list, I select a random sample for...

The Insider Threat: Strategies to Safeguard Against Malicious Insiders
...data! So, how can your organisation protect itself from malicious insiders? Our head of security testing, James Pickard, explains. In this interview Insider threat vs insider risk How big is...
Cyber Security Risk Assessment
...organisation millions. Cyber attacks and data breaches are inevitable, so the speed you react to a breach is critical. Cyber criminals only need to find one weakness to infiltrate your...