What is a Business Continuity Plan and Why your Company Needs One?

Blog Disasters and disruptive incidents are unpredictable and have high chances of interrupting the regular flow of a business. Studies show that 93% of companies that experience a disaster, without a recovery plan in place, go out of business within a year. A business continuity plan refers to the ability of an organization to keep… Continue reading What is a Business Continuity Plan and Why your Company Needs One?

Published
Categorized as Blogs

Rapid Attack Remediation and Cyber Risk Management – Panel Discussion with ISACA Singapore

Blog Every organization is prone to numerous cyber-attacks and data breaches that may result in critical data loss. With the growing severeness of attack patterns and complexities of threats, it has become challenging to detect, contain and remediate these attacks on time. Organizations must develop a suitable framework to combat cyberattacks through improvised risk management… Continue reading Rapid Attack Remediation and Cyber Risk Management – Panel Discussion with ISACA Singapore

Published
Categorized as Blogs

VIDIVA Transforms Payment Security – PCI DSS Assessment by SISA

Blog At a glance The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes. SISA helped VIDIVA achieve compliance with PCI DSS standards. VIDIVA Technology JSC, Vietnam A major technology company VIDIVA Technology JSC (henceforth called VIDIVA), a service… Continue reading VIDIVA Transforms Payment Security – PCI DSS Assessment by SISA

Published
Categorized as Blogs

How to Comply with GDPR Guidelines? Your Complete GDPR Guide

Blog What is GDPR compliance and how does it apply to your business? Which standards and principles have laid the foundation for GDPR? What are the business implications of GDPR? How will the geographical establishment of your business affect the process of GDPR compliance? And how can your business easily achieve GDPR compliance? General Data… Continue reading How to Comply with GDPR Guidelines? Your Complete GDPR Guide

Published
Categorized as Blogs

Key Insights: Decoding RBI instructions on Card Payments Security

Blog   At first glance, the basics of complying to RBI guidelines seem quite straight forward. However, the advancements in the forms and patterns of cyberattacks has made the RBI instructions on card payments security more dense and complex. For instance, RBI states that regulated entities shall follow payment card standards such as PCI PIN… Continue reading Key Insights: Decoding RBI instructions on Card Payments Security

Published
Categorized as Blogs

Addressing Existential Cyber Risks in Financial Institutions

Blog Digital plays a vital role in the maturity of financial institutions, but adopting new technologies comes with increased cyber risks. It is therefore likely no surprise that more than 50% of our survey respondents ranked cloud, technology knowledge gaps, and data & privacy requirements as the biggest cyber risks for their organizations.   How… Continue reading Addressing Existential Cyber Risks in Financial Institutions

Published
Categorized as Blogs

Data Protection and Cybersecurity Regulations in Singapore

Blog Cybersecurity regulations in Singapore impose mandates with a combination of both compliance and risk-based approaches. For forward looking businesses, it is an opportunity to build trust and cyber resilience. We’ll see how in this blog post. The continued success of digital transformation initiatives among businesses operating in Singapore bring with them a growing exposure… Continue reading Data Protection and Cybersecurity Regulations in Singapore

Published
Categorized as Blogs

AI in Cybersecurity: Incident Response Automation Opportunities

Blog In today’s digital world, the proliferation of cyberattacks continues to pose complex challenges for businesses. Even the best networks in the world are not immune to cyber incidents. By looking into the first half of 2021 itself, we have witnessed some of the biggest data breaches smashing down the security system of reputed companies… Continue reading AI in Cybersecurity: Incident Response Automation Opportunities

Published
Categorized as Blogs

Indicators of Behavior: A Shift to Cyber Resilience

Blog Cybersecurity teams assume that once there is a match between an Indicator of Compromise (IoC) and the generated logs, they will be able to successfully detect a potential threat. Wrong. Businesses have arguably seen more advanced cyberattacks in the last 12 months than in the last 12 years, bringing new and urgent task for… Continue reading Indicators of Behavior: A Shift to Cyber Resilience

Published
Categorized as Blogs

Data Classification: A necessity to secure your business

Blog According to a recent CISO/CIO survey that looked at cyber security challenges in large financial services companies, 45 percent of respondents have seen cyber security attacks rise since the pandemic began. Thus, to secure sensitive data, it is an imperative for organizations to invest in robust data security solutions that begin with data classification.… Continue reading Data Classification: A necessity to secure your business

Published
Categorized as Blogs