Asia's Source for Enterprise Network Knowledge

Saturday, March 23rd, 2019

IT audit and compliance

Most businesses aren't ready for Generation 6 Cyberthreats

As we begin to deploy IoT soluiotns, the Check Point CEO feels that the seucity it needs is sorely lacking. 

Report: Over 59,000 GDPR data breach notifications, but only 91 fines

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The low number of fines relative to the volume of reported breaches might be due to over-extended regulators, says a DLA Piper report.

 

Many companies are not GDPR-compliant: report

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Companies are prioritising improvements in cyber security

 

Singapore Businesses Can Turn GDPR Into a Transformational Opportunity

We talk to Micro Focus to find out if there are any upsides of GDPR for companies in Singapore.

Facebook says GDPR means ‘new privacy experiences for everyone’

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Facebook will force users worldwide to make decisions about their privacy settings as it complies with the European Union’s General Data Protection Regulation

 

Are you letting GDPR’s privacy rules trump security?

An extreme approach to protecting privacy can actually make personal data less safe. Don’t overreact.

 

The real reason you’re failing at PCI DSS compliance

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

For more than a decade, organizations have struggled to achieve and maintain PCI DSS compliance. The problem isn't knowledge or technology; it's proficiency.

 

How to ensure General Data Protection Regulation (GDPR) compliance in the cloud

IBM, Box to provide enterprises with option to store data regionally in Europe and Asia

Data subjects need to be well-informed about the use of their data and trust that it will be processed securely and only for purposes of which they are aware. This can be a challenge in the cloud, as it isn't always clear exactly where the data is.

10 ways you’re failing at IT audits

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

IT audits can feel like a grim nuisance, but great value awaits those who heed these common mistakes that inevitably lead to an IT audit disaster.

 

How to prepare for consent under the General Data Protection Regulation (GDPR)

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The requirements may appear daunting at first, but they also offer an opportunity for organisations to build customer trust and strengthen their reputations.