04 Apr, 2024 Australia summit puts spotlight on cyber intelligence and supply chain security By India Bednall Calvin Lu Wouter Veugelen Transparency and collaboration were the two key themes to come out of Clyde & Co’s 2024 Cyber Summit, which was sponsored by FTI...
13 Dec, 2023 Busting Ghost Companies and their Invisible Owners By Anna Bleazard Although Vietnam has been taking measures to align its anti-money laundering (“AML”) policies with global standards, not least by...
17 Aug, 2023 "Stumble In The Jungle" and the Perils of Digital Data Collection By Sandeep Jadav In a bizarre reversal of the plot of the Hunger Games, we may soon be witnessing two of the richest men in the world engaging in a cage...
20 Sep, 2022 The Future of Data Protection in India By Avigyan Das The Indian government has withdrawn its Personal Data Protection Bill 2021 as it looks to come up with a comprehensive legal framework. ...
13 Sep, 2022 Crypto Crime in India on the Rise: How to Avoid Getting Trapped By Avigyan Das In today’s increasingly connected digital world, all organisations and individuals are at risk from cyber-related threats. Cybercriminals...
02 Sep, 2022 A War on Disks...Will it be a Flop? By Sandeep Jadav Move over Kurt Cobain, the 90s continue to storm back into fashion with the recent tweet from Japanese Digital Minister Taro Kono where...
31 Aug, 2022 #HowTo: Enhance Data Security and Privacy By Gino Bello Whilst the article below is focused in Ireland, all of the guidance applies globally. Putting proper privacy and security processes in...
30 Aug, 2022 The Dog Ate My Homework (And Other Tales of Data Destruction) By Sandeep Jadav On a recent trip back to the UK, I was asked more than once by friends and family about the recent trial involving Colleen Rooney and...
26 Aug, 2022 The Era of Open Borders for Data is Ending By Gino Bello The idea of "data sovereignty" has taken over the data privacy world, and indeed how organisations do business with one another. This is...
25 Aug, 2022 Preparation, Detection & Analysis, Containment & Eradication, and Remediation By Suguru Yoshida Cyber attacks and data breaches are skyrocketing around the world, as are the financial implications of these incidents. According to IBM...
23 Aug, 2022 A Coast-to-Coast Tour of U.S. State Privacy Legislation By Frances Chen Organisations operating across state lines must now track exposure under and establish compliance with an ever-growing list of...
22 Aug, 2022 How to Prevent Wrongdoing and Insider Threats in Technological Matters By Gino Bello It is a proven fact that technological risks are among the main concerns of corporate senior management. This is corroborated by the...