With over 32 years of experience spanning hardware, enterprise resource software, product development and analytics, Rahul Monie, CISO partner at CTO Bridge Solutions, has been center stage for the IT evolution from basic hardware and software to complex data analytics and cybersecurity technology.
In this episode of Information Security Media Group's monthly series, "Insights APAC," ISMG editors discuss the top cybersecurity developments from November, including Australia's social media ban, Chinese data protection audits and the latest fine against Meta by India.
The privacy vendor market in India is evolving rapidly, as many vendors move from offering point solutions to embracing more integrated, platform solutions that can handle a broader range of privacy requirements, said Anirban Sengupta, partner, risk consulting practice with PwC.
South Korean technology companies have suffered at least 10 cases of sensitive technology leaks by malicious insiders since January and authorities recorded a 20% rise in such incidents over the previous year. The compromised technologies include OLED display technology and DRAM chip designs.
A South Asian threat actor identified as Mysterious Elephant or APT-K-47 by Knownsec 404 researchers is using a Hajj-themed lure to trick victims into malicious payload disguised as a Windows file. The hacker is using upgraded Asyncshell malware disguised as a Microsoft Compiled HTML Help file.
North Korean state actors are using fake websites of foreign technology service firms to sidestep sanctions and raise funding for Kim Jong-Un regime's weapons development programs. SentinelLabs found many of these sites shared similar infrastructure, owners and locations.
India's Competition Commission has fined social media conglomerate Meta over $25 million for forcing WhatsApp users to agree to a sweeping data sharing policy with other Meta platforms. The agency ordered the company to stop using users' data for online advertising on other Meta platforms.
In 2025, companies in China will face additional obligations when data protection audits become mandatory, setting a new benchmark for compliance with privacy laws. China is also expected to introduce regulations on non-personal data to establish a framework for ethical and secure data usage.
Information Security Media Group's Cybersecurity Summit in Mumbai, India, brought together cybersecurity professionals, regulators and technology leaders to examine the challenges in safeguarding India's rapidly digitizing economy and discuss actionable strategies for ensuring cyber defense.
The Australian government is alerting critical infrastructure providers that state-sponsored actors are positioning malware in their networks that can be weaponized to disrupt operations during major crises or a military conflict. The hackers employ living-off-the-land technique to avoid detection.
The acquisition of D'Crypt strengthens ST Engineering's cryptographic and high-security engineering capabilities while addressing evolving OT cybersecurity challenges in critical infrastructure sectors, said Goh Eng Choon, president of cyber at ST Engineering.
ISMG's Cybersecurity Summit: Mumbai on Wednesday hosted a packed audience of cybersecurity leaders, with keynote and plenary speakers stressing the importance of cyber resilience and aligning their processes with India's Digital Personal Data Protection Act.
The Australian government is on track to introduce a bill in the Parliament to ban youths under the age of 16 from accessing social media platforms, but critics say age verification technologies are not accurate and a ban may push children into unsafe, less visible parts of the internet.
Information Security Media Group's flagship Cybersecurity Summit will kick off in Mumbai on Nov. 13, bringing together India's top cybersecurity experts, practitioners and thought leaders to discuss the most pressing concerns, challenges and opportunities shaping the cybersecurity landscape in 2024.
Organizations in India are ramping up efforts to comply with the new Digital Personal Data Protection Act. But without the law being officially enforced, budget and hiring constraints make it challenging to allocate sufficient resources, said a panel of experts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.