The Chinese Personal Information Protection Law (PIPL) came into effect to protect online user data privacy. This policy was approved on 20 August 2021 and came into effect just 73 days later, on 1 November 2021. The correct implementation of the PIPL relies heavily on organisations and companies following regulations on new data privacy elements. Sanctions can be imposed if … [Read more...] about What Organisations Need to Do to Become PIPL Compliant
security
What is The Internet of Bodies (IoB), and Why Should You Care?
The Internet of Bodies (IoB) term was coined in 2016. It describes connected devices that monitor the human body, collect physiological, biometric, or behavioral data, and exchange information over a wireless or hybrid network. Standalone mobile apps that analyze physical activity and health-related data, such as heartbeat, blood pressure, and sleep cycles, can also be … [Read more...] about What is The Internet of Bodies (IoB), and Why Should You Care?
CISO Zero Trust Online A/NZ
How are InfoSec leaders taking advantage of Zero Trust to scale their businesses and protect their company's borders? The pandemic has forced organisations to adapt to a new era of distributed work'and cyber threats have adapted right along with them. What are the best-practice Zero Trust models for securing your business? What are the steps you must take to implement Zero … [Read more...] about CISO Zero Trust Online A/NZ
AI-Enabled Misinformation Is a Thing and We Must Acknowledge It
In a world where information is available at our fingertips, consider the potential for misinformation ”false or misleading information. Misinformation is spreading in all industries as a result of widespread biases and practices in publishing scientific material. Be it print media or a news show on your TV, misinformation is everywhere. There is a study saying AI-generated … [Read more...] about AI-Enabled Misinformation Is a Thing and We Must Acknowledge It
Why Should Organizations Investigate Cyber Security Incidents?
Has anyone tried to steal your sensitive data or encrypt your servers? How exactly did the attackers penetrate the network? Investigating cybersecurity incidents helps to determine the vector of malicious actions and find a malicious insider, as well as uncover possible APT (Advanced Persistent Threat) campaigns. Specialists involved in investigating cybersecurity incidents can … [Read more...] about Why Should Organizations Investigate Cyber Security Incidents?