August 24th, 2021 by Admin

In 2019, 12,174 new vulnerabilities were found in commercial and open source software1. The total number of breached records were 15.1 billion. This is a 284% spike compared to 2018.

(more…)

August 24th, 2021 by Admin

Measuring the effectiveness of and justifying the investment in security controls has become a key performance metric for enterprises because boards of directors and CEOs are expected to provide verifiable proof that business assets are protected from the fallout of a potential breach. However, as organizations begin to address cyber risk as a business problem, they also continue to manage security as an IT function.

(more…)

August 24th, 2021 by Admin

With the increased need for people to work remotely, we are seeing rising levels of targeted cyber attacks. Hackers are indiscriminately aiming for organisations of all sizes. Those with 5-500 employees are especially at risk. The resulting impact could be crippling for most businesses. Loss of financial assets and data, large penalties, business downtime, and damaged relationships with customers are becoming the norm.

(more…)

August 24th, 2021 by Admin

RBI gives highest importance to the security controls around it. Now it is proposed to issue Reserve Bank of India (Digital Payment Security Controls) Directions 2020, for regulated entities to set up a robust governance structure for such systems and implement common minimum standards of security controls for channels like internet, mobile banking, card payments, among others.

(more…)

August 24th, 2021 by Admin

This document provides a high-level overview of the security and privacy characteristics of the app that is in development by NHSx, the digital innovation unit of the National Health Service, to help manage the COVID-19 crisis in the UK.

(more…)

  •  Categories
  •  Disclaimer

    Unless otherwise indicated, Copyrights and Intellectual Property Rights of the documents, reports in this section of the website are under ownership of the original authors. Readers and Users of the information in the form of documents, reports and requested to comply with More..