CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Wei Chieh Lim
CEO at Data Privacy Asia
Wei Chieh Lim is the CEO of Data Privacy Asia, which sits at the intersection of data protection, privacy and cyber security and serves as the focal point for Asia’s professionals to learn, network and collaborate. He spent the last 20 years in the IT and consulting industry with roles in software development, network and security management, technology audit, consulting, business development and architecture research. Over the years, he has engaged with companies in more than 25 cities across Asia Pacific, U.S., Europe and Africa.


The Dangers of IP Grabber Links: What You Need to Know
Tech

The Dangers of IP Grabber Links: What You Need to Know

September 19, 2024
In today’s hyperconnected world, everything you do online leaves a digital trail. Whether you’re browsing social media, shopping, or playing...
Read More
Image of angry robot representing the question of whether data protection laws will impact artificial intelligence
Data PrivacyInsights

Will Data Protection Laws Kill Artificial Intelligence?

August 17, 2017
Data protection laws that demand explicit consent, right to be forgotten and algorithm transparency may have a chilling effect on artificial intelligence.
Read More
Image of mobile phone with shopping screen and coffee cup representing privacy in mobile advertising
Data PrivacyInsights

New Age for Privacy in Mobile Advertising

May 20, 2017
Telcos have their sights set on mining the rich data they gather from customers in order to increase revenues gathered by selling that data to media buyers. However, it’s an approach that they need to consider carefully. Increased regulation and scrutiny by authorities means that they can no longer simply use (or sell) consumer data in any way they see fit.
Read More
Image of drone flying towards city representing how ransomware is a threat to the internet of things
Cyber SecurityInsights

Ransomware: The Biggest Threat to the Internet of Things

March 28, 2017
There is now a new breed of highly sophisticated cyber criminals who are attracted by the huge financial gains made possible by highly targeted ransomware attacks. Today, with IoT being adopted across a wide variety of industries, it seems that it’s only a matter of time before cyber criminals take Internet of Things (IoT) devices hostage using ransomware, potentially placing hundreds of thousands of people at risk. In this article, we examine the rising threat of ransomware, the potential impact on the IoT environment and how we can avoid a global ransomware pandemic.
Read More
Image of participants at Data Privacy Asia 2015 with the theme to Establish an Ecosystem of Trust and Protection in the Digital Age
Data PrivacyInsights

Get Ready to Establish an Ecosystem of Trust and Protection in the Digital Age

October 18, 2016
The Data Privacy Asia 2016 Conference will feature top ranked industry experts from more than 15 countries and a more interactive audience experience than ever before. The Conference, which is themed Building Digital Trust: Establishing an Ecosystem of Trust and Protection in the Digital Age will examine subjects like trust vs. innovation and privacy vs. security, how enterprises can meet the challenges of a globally diverse regulatory and compliance landscape, and the privacy challenges on IT and security.
Read More
Image of hammer and gavel against backrop of soccer ball and red and yellow cards representing data protection
Data ProtectionInsights

Data Protection – A Tale of Two Cities

May 21, 2016
As personal data protection continue to challenge companies it is becoming apparent that the commissions and other structures that police these issues have become impatient with organisations that are not complying with recommendations. For the first time those companies which have suffered a data breach and been found not in compliance are feeling the wrath of governing bodies.
Read More
Image of open sign on wooden door representing companies in Asia being open to engaging the global community of independent white hats
Cyber SecurityInsights

Should Companies in Asia Engage the Global Community of Independent White Hats?

February 19, 2016
As the world becomes more complex non-traditional approaches to ensuring data security and protection must be evaluated. In this article Wei Chieh, the founder of SWARMNETICS draws a parallel between how we treat open source software and the Asian organisational attitude toward White Hat hackers (or ‘independent security researchers’) as assets that might help to stem the tide of security breaches that Asian companies face today.
Read More
- Advertisement -
- Advertisement -

Latest

Hacker hands using laptop showing car sharing platform data breach

Car Sharing Platform Zoomcar Hit by a Massive Data Breach, Impacting Approximately 8.4 Million People

Meta logo on device screen showing Meta AI

Meta AI Adds Warning That All Prompts, Including Those With Personal Information, Could be Made Public

Hacker working on keyboard showing cyber attack on whole foods distributor

Amazon’s Whole Foods Distributor United Natural Foods Hit by a Cyber Attack that Disrupted Operations

The White House in Washington DC showing cybersecurity executive order

New Cybersecurity Executive Order Takes on Election Interference Sanctions, Encryption Standards and Disinformation Programs

- Advertisement -
- Advertisement -
- Advertisement -
- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results