Your Search Results
Your search results for ‘list of data breaches’ returned 488 results
Email Security
...data breaches are caused by emails mistakenly being sent to the wrong recipient, for instance through misusing the Cc (carbon copy) and Bcc (blind carbon copy) fields. If personal information...

Breaking In to Keep Hackers Out: The Essential Work of Penetration Testers
...sanitisation of user input is all well and good, but showing how an attacker actually can gain access to that data – with a screenshot of that database to illustrate...
Cyber Security Risk Management
...DSS The PCI DSS (Payment Card Industry Data Security Standard) – applies to organisations of any size that accept card payments. Protecting digital cardholder data requires adherence to all the...

Looking Back on the Channel Partner Event and Awards 2024
...presents, such as prompt hacking and jailbreaks. Bridget made interesting points around how large language models such as ChatGPT are constantly using data to train their systems. A concern here...

Creating an AI Policy – A Guide for SMEs
...3. Protecting data privacy Building and maintaining customer trust is vital for long-term success, and a significant aspect of that trust relies on robust data security measures. An AI policy...

The Good, the Bad and the Improvable of PCI DSS v4
Version 4.0 of the PCI DSS (Payment Card Industry Data Security Standard) went into effect on 1 April 2024, surpassing v3.2.1. As a QSA (Qualified Security Assessor), I’ve completed a...