Category data-breaches

India’s DPDP Act Triggers Major Overhaul of Hotel Contracts Due to Data Liability Concerns

Transforming Contracts in the Wake of Data Privacy Legislation The Indian hospitality sector is currently experiencing a profound reassessment of its contractual agreements, catalyzed by the introduction of the Digital Personal Data Protection (DPDP) Act, 2023. Hotel operators are pursuing renegotiations of existing contracts with global partners and booking platforms,…

Read MoreIndia’s DPDP Act Triggers Major Overhaul of Hotel Contracts Due to Data Liability Concerns

Securing CPS in the Age of AI: The Need for a Programmatic Approach – Webinar

Sean Tufts: Championing Cybersecurity in Industrial Sectors Field CTO, Industrial, Claroty Sean Tufts stands at the forefront of cybersecurity, renowned for his extensive expertise in industrial security. As the Field Chief Technology Officer at Claroty, he combines comprehensive knowledge of cybersecurity practices with strong leadership in go-to-market strategies, driven by…

Read MoreSecuring CPS in the Age of AI: The Need for a Programmatic Approach – Webinar

Data Breach: Hackers Expose Over Two Million Records Following Harvard and UPenn’s Ransom Rejection

A significant data breach has emerged, as a cybercrime organization known as ShinyHunters has claimed responsibility for leaking over two million personal records reportedly stolen from Harvard University and the University of Pennsylvania (UPenn). This incident marks an escalation of last year’s data breaches, creating a serious privacy crisis for…

Read MoreData Breach: Hackers Expose Over Two Million Records Following Harvard and UPenn’s Ransom Rejection

New Guidelines Outline Apple’s Legal Protocol for Processing Law Enforcement Data Requests

Apple Clarifies Guidelines for Law Enforcement Data Requests In a recent disclosure, Apple has reaffirmed its position on the handling of user data in response to legal requests from U.S. law enforcement agencies. Despite longstanding suspicions fueled by revelations about the National Security Agency (NSA)’s DROPOUTJEEP program, Apple continues to…

Read MoreNew Guidelines Outline Apple’s Legal Protocol for Processing Law Enforcement Data Requests

Live Webinar: Implementing Zero Trust in the Middle Mile – Leveraging AI for Optimal Access Management, Reducing Alert Noise, and Ensuring Compliance

Governance & Risk Management: Embracing Zero Trust Presented by Microsoft Duration: 60 minutes As federal agencies progress through their Zero Trust implementations, many encounter challenges in translating strategic goals into actionable, measurable outcomes. This webinar aims to shed light on how artificial intelligence (AI) can support security teams in refining…

Read MoreLive Webinar: Implementing Zero Trust in the Middle Mile – Leveraging AI for Optimal Access Management, Reducing Alert Noise, and Ensuring Compliance

Cyber Attacks, AI Misuse, and Data Privacy Regulations: Key Risks for India’s Corporate Boardrooms

Rising Cybersecurity Threats and AI Governance Issues Highlighted in FICCI–EY Risk Survey Recent findings from the FICCI–EY Risk Survey 2026, released on February 8, illustrate escalating risks that Indian businesses face, chiefly stemming from cybersecurity breaches, inadequate governance of artificial intelligence (AI), and increasing scrutiny under India’s data protection laws.…

Read MoreCyber Attacks, AI Misuse, and Data Privacy Regulations: Key Risks for India’s Corporate Boardrooms

Book Review: Hacking Point of Sale – A Comprehensive Exploration of Payment Application Security

Rising Concerns Over Point-of-Sale Systems Amidst Cybersecurity Threats In an era where digital transactions reign supreme, the security of Point-of-Sale (POS) systems is increasingly critical. These computerized systems have evolved far beyond basic cash registers, offering swift transaction processing, accurate record-keeping, and comprehensive inventory management. However, the growing complexity of…

Read MoreBook Review: Hacking Point of Sale – A Comprehensive Exploration of Payment Application Security