vsRisk Cloud - ISO 27001 risk assessments made simple

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part ...

Achieve Security Through Compliance in the Cloud

| | CIS, Cloud, Compliance
Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time since I’ve had a need to plug in my trusty USB floppy ...
Business Continuity and Disaster Recovery

Business Continuity and Disaster Recovery: Your Organization’s Safety Plan

From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization's best defense is ...
Government Messaging Solutions for the 21st Century: Think Beyond Encryption

Government Messaging Solutions for the 21st Century: Think Beyond Encryption

The DNC email leak in 2016 revealed just how insecure email communications can be. It should be no surprise that government officials have been turning to other, more secure mediums, to communicate ...
Marriott: The Case for Cybersecurity Due Diligence During M&A

Marriott: The Case for Cybersecurity Due Diligence During M&A

If ever there was a perfectly packaged case study on data breaches, it’s Marriott’s recently disclosed megabreach. Last week, the hotel chain announced that its Starwood guest reservation system was hacked in ...

California IoT Security Law: A Nearsighted, Toothless Guard Dog or a Wolf in Sheep’s Clothing?

With three new sections added to the California Civil Code, California became the first U.S. state with a cybersecurity law specifically for internet-connected devices on September 28, 2018. The new Security of ...
Much Ado About Financial Services and Compliance

Much Ado About Financial Services and Compliance

Why financial institutions should adapt a data-centric approach for compliance obligations Last September my colleague Alex Tay tackled the state of cybersecurity in Singapore and reasons for critical information infrastructure (CIIs) sectors ...

The Debt we owe to Arron Banks

However your business is likely to be affected by Brexit, Arron Banks may just have helped you out. How? By drawing attention to the myriad responsibilities organisations have to protect users’ personal ...

Security vs. Compliance: What’s the Difference?

Security and compliance are often said in the same breath as if they are two sides of the same coin, two members of the same team or two great tastes that go ...

DPIAs and why every organisation needs to conduct them

Do you know what a DPIA is? Do you need to conduct one? This blog will give you an introduction to DPIAs and why and when you should conduct one. What is ...
Loading...