With the pandemic accelerating digital transformation, there has also been a surge in fraudulent activity as threat actors are exploiting newly remote operations. In today’s digital world, knowing your customer is more critical than ever before.
This article is based on a presentation made by Steven Klimt, a partner in the Sydney office of Clayton Utz during the Data Privacy Asia 2016 conference held on 9-11 November 2016. It outlines the new mandatory data breach reporting legislation, how Australian privacy regulation impacts Big Data and the differences between Australian Privacy legislation and the proposed EU GDPR.
Scanning images in billions of users’ files without warrants, is Google helping the U.S. government to conduct warrantless searches and violating the Fourth Amendment?
A modern identity and access management system is critical to manage access across multiple operating systems, devices, locations and applications, based on what a user should be able to do and what they will need over time.
Companies are turning to AI to defend their networks and make up for a lack of personnel, but will it be smart enough to recognize a real threat with hackers developing their own AI-powered tools too?
The relentless march to the cloud is good news for CIOs concerned about ransomware. And once most enterprises have most of their infrastructure there, ransomware attacks will become an occasional annoyance, not a catastrophic disaster.
For decades smart cards have been the foundation of access control and security systems. In smart cities, smart cards will play a key multiapplication role across public and private sector services.
To build a successful career in the sphere of cybersecurity, one should show both considerable technical knowledge and positive personal qualities.
Any leader handling data in this ever-evolving landscape must understand how to categorize data to better protect their organizations and customers when working in challenging and emerging markets.
Cloud computing has evolved rapidly and brought new risks to cloud security. Companies need to find ways to securely use multiple cloud services and applications.