Rapid Attack Remediation and Cyber Risk Management – Panel Discussion with ISACA Singapore

Blog Every organization is prone to numerous cyber-attacks and data breaches that may result in critical data loss. With the growing severeness of attack patterns and complexities of threats, it has become challenging to detect, contain and remediate these attacks on time. Organizations must develop a suitable framework to combat cyberattacks through improvised risk management… Continue reading Rapid Attack Remediation and Cyber Risk Management – Panel Discussion with ISACA Singapore

Published
Categorized as Blogs

VIDIVA Transforms Payment Security – PCI DSS Assessment by SISA

Blog At a glance The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes. SISA helped VIDIVA achieve compliance with PCI DSS standards. VIDIVA Technology JSC, Vietnam A major technology company VIDIVA Technology JSC (henceforth called VIDIVA), a service… Continue reading VIDIVA Transforms Payment Security – PCI DSS Assessment by SISA

Published
Categorized as Blogs

How to Comply with GDPR Guidelines? Your Complete GDPR Guide

Blog What is GDPR compliance and how does it apply to your business? Which standards and principles have laid the foundation for GDPR? What are the business implications of GDPR? How will the geographical establishment of your business affect the process of GDPR compliance? And how can your business easily achieve GDPR compliance? General Data… Continue reading How to Comply with GDPR Guidelines? Your Complete GDPR Guide

Key Insights: Decoding RBI instructions on Card Payments Security

Blog At first glance, the basics of complying to RBI guidelines seem quite straight forward. However, the advancements in the forms and patterns of cyberattacks has made the RBI instructions on card payments security more dense and complex. For instance, RBI states that regulated entities shall follow payment card standards such as PCI PIN and… Continue reading Key Insights: Decoding RBI instructions on Card Payments Security

Published
Categorized as Blogs

Addressing Existential Cyber Risks in Financial Institutions

Blog Digital plays a vital role in the maturity of financial institutions, but adopting new technologies comes with increased cyber risks. It is therefore likely no surprise that more than 50% of our survey respondents ranked cloud, technology knowledge gaps, and data & privacy requirements as the biggest cyber risks for their organizations. How do… Continue reading Addressing Existential Cyber Risks in Financial Institutions

Published
Categorized as Blogs

Data Protection and Cybersecurity Regulations in Singapore

Blog Cybersecurity regulations in Singapore impose mandates with a combination of both compliance and risk-based approaches. For forward looking businesses, it is an opportunity to build trust and cyber resilience. We’ll see how in this blog post. The continued success of digital transformation initiatives among businesses operating in Singapore bring with them a growing exposure… Continue reading Data Protection and Cybersecurity Regulations in Singapore

Published
Categorized as Blogs

AI in Cybersecurity: Incident Response Automation Opportunities

Blog In today’s digital world, the proliferation of cyberattacks continues to pose complex challenges for businesses. Even the best networks in the world are not immune to cyber incidents. By looking into the first half of 2021 itself, we have witnessed some of the biggest data breaches smashing down the security system of reputed companies… Continue reading AI in Cybersecurity: Incident Response Automation Opportunities

Published
Categorized as Blogs

Indicators of Behavior: A Shift to Cyber Resilience

Blog Cybersecurity teams assume that once there is a match between an Indicator of Compromise (IoC) and the generated logs, they will be able to successfully detect a potential threat. Wrong. Businesses have arguably seen more advanced cyberattacks in the last 12 months than in the last 12 years, bringing new and urgent task for… Continue reading Indicators of Behavior: A Shift to Cyber Resilience

Published
Categorized as Blogs

Data Classification: A necessity to secure your business

What is Data Classification? Data classification in its core is the process of identifying and categorizing data based on its sensitivity, level, type, and importance to an organization. This helps in determining the appropriate security measures and access controls to protect the data from unauthorized access, loss, or misuse. According to ISO 27001, data classification… Continue reading Data Classification: A necessity to secure your business

6 Reasons Why You Need Incident Response as a Service

Blog A security breach can result in confidential data leakage and disruption of business operations, and most importantly, data breaches can damage the business reputation. To recover from any security breach and prevent such incidents in the future, incident response services play an important role. Incident response is one of the most prominent threat prevention… Continue reading 6 Reasons Why You Need Incident Response as a Service

SISA’s Latest
close slider

Webinar

Infosec Report

The current query has no posts. Please make sure you have published items matching your query.