KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Personal data protection in the MCST context: 3 Case studies MCSTs are organisations that also need to comply with the PDPA. Since they process personal data, there is a need for them to comply with the PDPA obligations for the protection of personal data. Failure to do so means they can be liable for a
Data governance framework: What organisations in Singapore should know In the past few years, there have been a lot more cybersecurity challenges in Singapore. Threats and attacks on government and private institutions had a big effect on the data and security landscape of the country. Demands for stricter rules about data governance, compliance, and security
What is the purpose of penetration test? The concept of penetration testing generates numerous questions for organisations. That is entirely reasonable. The testers request permission to attempt to circumvent your network’s security restrictions. They will engage in activities that are indistinguishable from actual cyber-attacks. Prior to agreeing to a simulated attack on your organisation’s network
Blockchain and Personal Data Protection: The PDPC Guide Businesses and organisations throughout the globe are beginning to implement Distributed Ledger Technologies (DLTs), such as blockchains, for a variety of finance and supply chain management applications. Some of these applications may begin to store personal information in blockchain networks. Due to the differences in how blockchains