Get a quote
Search Results

Your Search Results

Your search results for ‘list of data breaches’ returned 486 results

Post

AWS Outage: A Supply-Chain Security Lesson

...practical steps you can take: 1. Map your dependencies Identify which Cloud/digital service providers you rely on (for example hosting, databases, authentication). Document which services you are using (for example...

Post

NIS Regulations: Cyber Assessment Framework

...protection policies and procedures B.2 Identity and access control B.3 Data security B.4 System security B.5 Resilient networks and systems B.6 Staff awareness and training Objective C Detecting cyber security...

Post

Transitioning to ISO 27001:2022 | GRC Solutions

...vulnerabilities and apply controls to treat and manage them; Create auditable logs of data privacy and security incidents, including affected assets, responsible users and estimated losses; and Select relevant legislation...

Post

Learn From Anywhere

As a company that fully embraces flexible and remote working, we have improved our delivery methods to allow you to learn from anywhere and always get the full benefit of...