Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

The Third-Party Threat for Financial Organisations

...highest quality”. What “information security standards” are considered “appropriate”? Unlike the GDPR (General Data Protection Regulation), DORA does not require that these standards be identified by a specific authority, so...

Post

Why You Need Cyber Resilience and Defence in Depth

...organisational controls are in place to protect the confidentiality, integrity and availability of our data and systems. The service met with our expectations and the report generated highlighted points that...

Post

Author of the Month: Bridget Kenyon

...for (ISC)2, and a Fellow of the Chartered Institute of Information Security. She’s also been a PCI DSS QSA (Payment Card Industry Data Security Standard Qualified Security Assessor), been head...

Post

The 9 CISMP Domains Explained

...security. 1.3 Describe the terms and principles associated with personal data privacy legislation and considerations. 2. Information Risk 2.1 Describe the key components of risk management. 2.2 Explain the processes...