Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 487 results

Post

How Can Organisations Transition to ISO 27001:2022?

...deletion 8.11: Data masking 8.12: Data leakage prevention 8.16: Monitoring activities 8.23: Web filtering 8.28: Secure coding Organisations should look through those new controls, and determine whether or not they’re...

Post

Red Team vs Blue Team: What’s the Difference?

...the blue team, in a battle to control a particular asset. That could be sensitive data, financial records, communication channels or the organisation’s infrastructure itself. Assessments can be adapted to...

Post

The 5 CISA Domains Explained

...Audit Data Analytics Reporting and Communication Techniques Quality Assurance and Improvement of Audit Process 2. Governance & Management of IT This domain examines candidates’ ability to identify critical issues and...