Friday Jul 10th

Enabling data-driven innovation through trusted data sharing in a digital economy
The Infocomm Media Development Authority (IMDA) and Personal Data Protection Commission (PDPC) just announced the first comprehensive Trusted Data Sharing Framework to facilitate trusted data sharing between organisations. 
Read more...
MediaMath and White Ops build transparency and trust into the Programmatic Supply Chain
MediaMath and White Ops, the global leader in bot fraud protection, announced a new partnership that will protect some of the world's largest advertisers, agencies and publishers from sophisticated invalid traffic (SIVT) before it can be purchased. Partnering identity and detection solutions from bo ...
Read more...
Logic bomb
A ‘logic bomb’ is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Read more...
Major vulnerability in Evernote’s Chrome Extension discovered
Guardio, a new breed of cyber security product designed to tackle threats and security concerns within the browser, discovered a major flaw in Evernote’s Web Clipper Chrome extension’s code that left it vulnerable, potentially allowing threat actors to access personal information from us ...
Read more...
Brain-Computer Interfaces, AI, and Androids: are we keeping the upper hand?
The way the user will communicate with computers in the future is in for a big change. After keyboards, mice, touchscreens, gesture and voice recognition, the avant-garde computer research relies on so-called brain-computer interfaces. The novel interfaces should allow the user to control more compl ...
Read more...
Cyber Security Management protects holistically by mastering all vulnerability gaps
Today, companies are more worried than ever about how they can reliably secure their entire organization against cyber-attacks. Their main focus is on ensuring to put holistically secure products on the market, as well as to protect expertise stored in databases and private data of employees, suppli ...
Read more...
PII
Personally Identifiable Information (PII) is a category of sensitive information that is associated with an individual person, hence, it should be accessed only on a strictly need-to-know basis and handled and stored with care.
Read more...
Security is a journey, not a destination
Now, more than ever, cybersecurity teams are seeking to become more agile. They help organisations meet regulatory compliance requirements, align to industry best practices, and accelerate business transformation initiatives. Effective cybersecurity acts as a business enabler – building custom ...