News & Insights
- Cyber attack
- Cyber security
- Data protection
- Geopolitical Risk
- Incident Response
- Information security
- ISO 27001
- PCI DSS
- Penetration testing
- Risk portal
- Social Media Intelligence
5 ISO 27001 myths that make the Standard seem expe...
Here are the 5 ISO 27001 myths stopping organisations getting the most from the Standard, that our H…Read More
The challenges of PCI DSS compliance
Instead of regarding PCI DSS as an overhead to be avoided, organisations should regard it as a valua…Read More
Twittergate: This time you can’t blame technology
Cyber attacks aren't always as simple as a technological failing, human error is a large element of…Read More
The importance of Identity and Access Management
A robust IAM process is a crucial part of any information security management system—it ensures a us…Read More
Use lockdown to boost your information security ca...
Preparing for the next step in your career is easier said than done. CPD and other professional deve…Read More
Simplifying your DSPT submission [Infographic]
There are steps you can take to reduce that burden and PGI can work with you to help identify what a…Read More
Two years of GDPR: Clarifying personal data [Infog...
The 25th May 2020 will mark the two-year anniversary of the implementation of the General Data Prote…Read More
Changes to the Data Security and Protection Toolki...
Keeping data safe is an ongoing process—once a regulation or process is in place, the body responsib…Read More
The importance of checking Firewall Rules and PCI ...
Requirement 1 in the Payment Card Industry Data Security Standard is largely concerned with firewall…Read More
Supply chain: Is your security entirely in your ha...
In this blog post, our Information Assurance team look at what you can do to manage the risk associa…Read More