IT Compliance

Back to homepage

Changing Cyber Security Best Practice

According to The State of Enterprise Security in South Africa 2019, conducted by World Wide Worx in partnership with Trend Micro and VMware, almost 73% of respondents cite acquiring new

Cyber Security Nordic: Have data? Use it, delete it

Toxic data in the industry parlance usually means non-consented information obtained from users, which poses the chance of penalties under data protection regulations. However, data hoarded without any immediate use

Companies are still struggling to get GDPR compliant

It seems as companies ‘greatly’ underestimated the work that needed to be done in order to become GDPR-compliant.This is according to a new report by the Capgemini Research Institute, which

As consumers engage with insurance companies online, new types of digital fraud emerge

 As more U.S. consumers use digital platforms when engaging with insurance companies, new fraud challenges are likely to arise for insurance carriers, according to TransUnion and iovation. Click here to view original

Organizations continue to struggle with privacy regulations

Many organizations’ privacy statements fail to meet common privacy principles outlined in GDPR, CCPA, PIPEDA, including the user’s right to request information, to understand how their data is being shared with third

Separate law, budget needed for cyber security: DCA head

PUNE: Rear Admiral Mohit Gupta, head of the newly created Defence Cyber Agency (DCA), said on Thursday that the country needs a separate law, budgetary allocation and a task force to tackle

Establishing Efficient Data Governance Processes to Add Business Value

These days, organizations are awash with more data than ever before. The challenges this presents are compounded by evolving regulatory changes such as the General Data Protection Regulation (GDPR), which

Regulations are driving innovation toward an identity layer on the Internet

The security community often points to the inherent lack of an encryption layer on the Internet as a factor behind many of the related threat vectors. The decentralized nature of

How to navigate critical data security and privacy policy challenges

By 2020, there will be 40x more bytes of data than there are stars in the universe as we know it. And with data growth comes more security and privacy obstacles for

India to unveil cyber security strategy policy in January

India will release the cyber security strategy policy in January next year to enable the government to “cyber-secure the nation”, which will also help in achieving the target to achieve