Survey reveals 86% of organisations worldwide are concerned that a failure to adhere to the upcoming General Data Protection Regulation could have a major negative impact on their business.

To provide for uniform data protection rights, the key is to adopt an adaptive, user-centric, layered security model approach around the tenets of prevent, detect, respond and predict.

Lee Hsien Loong

Strategy brings in the international dimension and strengthens emphasis on CII protection, the creation of a safer cyberspace and capability building.

Venkat Krishan of Cognizant

Instead of the waiting game, organisations could work with the idea of a “plural IOT”, says Venkat Krishnan of Cognizant.

Cloud Security Alliance releases the baseline document for its upcoming CSA STAR Mobile certification and testing scheme.

ACCA report on cybersecurity

An appeal to business self-interest and broad guidance aimed at ensuring outcomes will offer the required flexibility to tackle cybercrime, says ACCA report.

IOT standards

The adoption of ITU-T recommendations could help governments and industries take bigger strides towards developing international IoT standards in the near future.

Heather Levy of Gartner

Build your cloud strategy by planning and assembling ingredients as you would for a fine meal, says Heather Levy of Gartner.

A resilient cyber security strategy must be holistic and address different stages of an attack, including prevention, response and mitigation.

Ryan Koh of Protiviti

“It is important to identify what is sensitive, what it is that organisations need to protect, and not spend money trying to protect everything,” says Ryan Koh of Protiviti.

Pages

Subscribe to RSS - Standards & Best Practices