Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

Management system integration

...an integrated management system (IMS). With data protection and information security becoming an increasingly important global concern, the international information security standard, ISO/IEC 27001:2022, has become crucial for organisations wishing...

Post

ISACA Training

...Or train again for free. Specialist information security educators We’ve trained more than 20,000 professionals globally in data privacy, security and compliance. Learn from anywhere Attend the course Live Online....

Cookies under the PECR and DUAA fact sheet
Post

Cookie Exceptions under PECR and the DUAA

Stay on track and pass your CISSP exam with confidence Preparing for the CISSP exam requires careful planning and effective time management. With eight domains to cover and a demanding...

Post

DORA resource hub

...the DORA Regulation “The financial sector is quite heavily regulated, and involves a lot of confidential data. You’d therefore expect that the sector fares better at data security than your...