Email:

Phone No.

Whatsapp

Tag: privacy ninja

Privacy Ninja CEO Andy Prakash Speaks at Temasek LEAD Leadership Programme on AI Ethics and Trust in the Age of AI
Privacy Ninja CEO Andy Prakash Speaks at Temasek LEAD Leadership Programme on AI Ethics and Trust in the Age of AI
Privacy Ninja CEO Andy Prakash Speaks at Temasek LEAD Leadership Programme on AI Ethics and Trust in the Age of AI
Privacy Ninja CEO Andy Prakash Speaks at Temasek LEAD Leadership Programme on AI Ethics and Trust in the Age of AI

Privacy Ninja CEO Andy Prakash Speaks at Temasek LEAD Leadership Programme on AI Ethics and Trust in the Age of AI

Privacy Ninja CEO Andy Prakash Speaks at Temasek LEAD Leadership Programme on AI Ethics and Trust in the Age of AI Privacy Ninja Founder and CEO Andy Prakash was invited to speak at the Temasek Leadership Programme (LEAD) at Temasek Polytechnic on 11th March 2026, where he joined industry leaders to discuss how artificial intelligence

0 downtime, real exposure: detecting the data breach you don’t see

0 downtime, real exposure: detecting the data breach you don’t see If your systems are running and customers are not complaining, it is tempting to assume you are safe. Yet many of today’s most damaging breaches are designed to feel like business as usual. Attackers increasingly prefer to log in, move quietly, and leave with

CTM Level 5: the new baseline for supply chain cybersecurity

CTM Level 5: the new baseline for supply chain cybersecurity Singapore is raising the bar on cybersecurity in a way that goes beyond the obvious “critical systems” narrative. The latest push is not only about protecting Critical Information Infrastructure (CII) itself, but about hardening the surrounding ecosystem that keeps essential services running, including supporting IT,

12,000 leaked documents: Cybersecurity challenges in supply chain

12,000 leaked documents: Cybersecurity challenges in supply chain In late February 2026, reports claimed that a dark web leak involved 255 Singapore organisations linked to critical information infrastructure (CII) that had been infiltrated. The report described around 12,000 leaked documents tied to a group alleged to have conducted hacking while publicly operating as a cybersecurity

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us