KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
OSINT, defined Open-source intelligence (OSINT) is the process of getting information from sources that have been published or are otherwise open to the public. OSINT operations are done by IT security professionals, malicious hackers, and state-sanctioned intelligence operatives. They use advanced techniques to search through the huge amount of visible data to find the needles
Good data protection practices for MCSTs: How PDPA Applies The Personal Data Protection Act also applies to the MCST. One, because it is an organisation based in Singapore, and two, because it is fundamental for them to collect, use, disclose, and manage personal data. Therefore, the MCST must comply with the Act’s data protection requirements.
Penetration testing service: What your business should know In today’s day and age, organizations must make sure that their systems and databases are breach-proof and inaccessible to any bad actors who want to profit from the invisible weak points that only thorough scanning can locate and identify. As the push to digitalization is at full
The June 2022 PDPC Incidents and Undertaking decision of the Personal Data Protection Commission (PDPC) have been published on PDPC’s official website. For this month, five (5) cases have been issued covering the financial penalty of Vhive, the warning issued to three financial advisers, the decisions being not in breach covering SLP Scotia and SLP International Property Consultants and Aman