APP-ACSM | APPACSM2018ISSUE4 | Cyber Security | Featured | September 29, 2023 Chinese State Linked Hackers Target US & Japanese Multinationals Written by staff writer. Multiple law enforcement and security agencies are warning US and Japanese multinationals to check the internet… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More APPACSM2018ISSUE4 | Contributors | Cryptocurrency | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Next Gen Tech | Vulnerabilities | May 24, 2018 Cryptocurrency Insecurity Mt. Gox, where are our bitcoins? Mark Karpeles bowed in front of the Japanese press with his eyes closed. He… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Information Security | Next Gen Tech | May 24, 2018 Everything you need to know about breach notifications When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | May 22, 2018 Breach notification isn’t just about breach notification Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Information Security | Next Gen Tech | Skills & Training | Vulnerabilities | May 28, 2018 Cyber Insurance – A Buyer’s Guide Part 3 In this third article in our series about cyber insurance, we’re looking at two publicised examples of how a Cyber… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More APPACSM2018ISSUE4 | Contributors | Cryptocurrency | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Next Gen Tech | Vulnerabilities | May 24, 2018 Cryptocurrency Insecurity Mt. Gox, where are our bitcoins? Mark Karpeles bowed in front of the Japanese press with his eyes closed. He… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Information Security | Next Gen Tech | May 24, 2018 Everything you need to know about breach notifications When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | May 22, 2018 Breach notification isn’t just about breach notification Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | End-Point Security | Information Security | Next Gen Tech | May 28, 2018 SMART ID: Ethereum blockchain identity management We all know the mere mention of the words ‘Papers Please’ or ‘KYC’ (know your customer) conjures up an uncomfortable… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More APPACSM2018ISSUE4 | Contributors | Cryptocurrency | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Next Gen Tech | Vulnerabilities | May 24, 2018 Cryptocurrency Insecurity Mt. Gox, where are our bitcoins? Mark Karpeles bowed in front of the Japanese press with his eyes closed. He… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Information Security | Next Gen Tech | May 24, 2018 Everything you need to know about breach notifications When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | May 22, 2018 Breach notification isn’t just about breach notification Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Network Security | Next Gen Tech | Vulnerabilities | May 24, 2018 Beyond the horizon insights: How India is coping with cyberthreats? A massive debate is raging across India on the rightwing Bharatiya Janata Party (BJP)-led government’s agenda on mining personal data… Read More APPACSM2018ISSUE4 | Contributors | Cryptocurrency | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Next Gen Tech | Vulnerabilities | May 24, 2018 Cryptocurrency Insecurity Mt. Gox, where are our bitcoins? Mark Karpeles bowed in front of the Japanese press with his eyes closed. He… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Information Security | Next Gen Tech | May 24, 2018 Everything you need to know about breach notifications When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | May 22, 2018 Breach notification isn’t just about breach notification Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | Cryptocurrency | Editor's Desk | Governance, Risk & Compliance | Hacking & Penetration Testing | Next Gen Tech | Vulnerabilities | May 24, 2018 Cryptocurrency Insecurity Mt. Gox, where are our bitcoins? Mark Karpeles bowed in front of the Japanese press with his eyes closed. He… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Information Security | Next Gen Tech | May 24, 2018 Everything you need to know about breach notifications When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | May 22, 2018 Breach notification isn’t just about breach notification Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Governance, Risk & Compliance | Information Security | Next Gen Tech | May 24, 2018 Everything you need to know about breach notifications When the board approaches you for guidance on how changing legal requirements could impact the organisation, how prepared are you?… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | May 22, 2018 Breach notification isn’t just about breach notification Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | May 22, 2018 Breach notification isn’t just about breach notification Mandatory breach notification is fast becoming a requirement all over the world. Whether you need to comply with GDPR on… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | May 11, 2018 Executive Editor’s Interview with David Kemp General Data Protection Regulation: Insights into the fundamentals, ramifications & opportunities: The European Union’s General Data Protection Regulation comes into… Read More APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | CyberTech Verticals | Editor's Desk | Information Security | Next Gen Tech | Strategy & Architecture | Vulnerabilities | May 11, 2018 Now what? I have to notify the OAIC? A seven-step plan to keep OAIC at bay. It is Monday 19th March and the day started like any other.… Read More APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next
APPACSM2018ISSUE4 | Contributors | Editor's Desk | Hacking & Penetration Testing | Skills & Training | Vulnerabilities | May 11, 2018 Who is the most offensive tester in the room? Talking of Offensive Individuals – Penetration Testers My love of hacking systems came from way back, before penetration testing was… Read More 1 2 Next