August 23rd, 2021 by Admin

In 2019, Gartner estimated worldwide spending on information security-related products and services would be $124 billion – increasing 8% from 2018. In spite of this investment, the breaches and malicious attacks continues to grow. As organizations recover from effects of the COVID-19 pandemic, the impact of these breaches extends beyond the bottom line.

(more…)

August 23rd, 2021 by Admin

In today’s digital economy, data isn’t just a means to create value, it has value itself. If banks were the target of the last century, data is the target of this century. The increasing use of tactics like social engineering and deep fakes, coupled with the ever-present threats of global warfare and infrastructure attacks endanger everything from email servers to our phones. Securing data in the 21st century requires a holistic approach to security operations that starts from the boardroom on down.

(more…)

August 23rd, 2021 by Admin

Cyber criminals are preying on fears of COVID-19 and sending scam emails. These may claim to have a cure for the virus, offer a financial reward, or might encourage you to donate. If clicked, you’re sent to a dodgy website which could download viruses onto your device, or steal your passwords.
Don’t click on any such links. For genuine information about the virus, please use trusted resources such as the Public Health England or NHS websites.

(more…)

August 23rd, 2021 by Admin

The GDPR, implemented in the EU in May 2018, continues to generate shockwaves internationally. The immediate impact for businesses headquartered in the APAC region has been the extension of the scope of application of European data protection law from an “establishment” concept limiting the law’s application to organizations with “bricks and mortar” operations on the ground in the EU
to a broader set of criteria making the GDPR applicable to APAC businesses.

(more…)

August 23rd, 2021 by Admin

This ENISA study introduces good practices for IoT security, with a particular focus on software development guidelines for secure IoT products and services throughout their lifetime. Establishing secure development guidelines across the IoT ecosystem, is a fundamental building block for IoT security. By providing good practices on how to secure the IoT software development process, this study tackles one aspect for achieving security by design, a key recommendation that was highlighted in the ENISA Baseline Security Recommendations study which focused on the security of the IoT ecosystem from a horizontal point of view.

(more…)

  •  Categories
  •  Disclaimer

    Unless otherwise indicated, Copyrights and Intellectual Property Rights of the documents, reports in this section of the website are under ownership of the original authors. Readers and Users of the information in the form of documents, reports and requested to comply with More..