Written by staff writer. Multiple law enforcement and security agencies are warning US and Japanese multinationals to check the internet…
In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber…
We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable…
A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data…
Mt. Gox, where are our bitcoins? Mark Karpeles bowed in front of the Japanese press with his eyes closed. He…
When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?…
Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on…
General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into…
A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.…
Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was…