Latest Publications

Share:

When Did You Last Test Your Cyber Incident Response Plan?

A cyber incident response plan is a set of guidelines and protocols designed to help an organization detect, respond, contain, and manage any form of a cybersecurity breach. It outlines how best to safeguard the organization...more

Advisory Note - IBM IPAA revisions and its impact

Are you using any IBM software in your organization? IBM released the latest Version (11) of its International Passport Advantage Agreement (IPAA)/ International Passport Advantage Express Agreement (IPAEA) last week. The...more

Challenges of AI-Assisted Coding

Open-source software is different from traditional, licensed software, and some developers might want to be careful about how they use open-source platforms. AI has complicated matters further, and developers need to be aware...more

Pharma Companies Can Ensure Data Integrity With User Access Management (UAM)

Life sciences industry has regulatory compliance at the center of all its operations, so maintaining the integrity of data has always been a pressing need for this industry globally. Regulators such as the United States Food...more

Advisory Note - ESXiArgs ransomware attack targets VMware ESXi servers

Are you using VMware ESXi servers? Why should you worry? Unpatched VMware ESXi servers are actively being attacked against a two-year-old remote code execution vulnerability to deploy a new ESXiArgs ransomware. ...more

ChatGPT: The End of Google Search?

As technology continues to advance, Artificial Intelligence (AI) is becoming more and more prevalent in our everyday lives. From self-driving cars to virtual assistants, AI is quickly becoming an integral part of our lives....more

How Businesses Can Mitigate Legal Risks by Decommissioning End of Cycle Applications Forensically

Digital environment has brought flexibility and efficiency to business by having multi-cloud environments, and scalable cloud-hosted applications. However, it becomes a nightmare for Technical Operations (Tech Ops) to...more

Everything You Need To Know About India’s New Guidelines Related to Cyber Incident Reporting by CERT-In

On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In), a functional organization under the Ministry of Electronics and Information Technology (MeitY), Government of India issued directions under sub-section...more

How SEBI Can Use Advanced Analytics to Curb Insider Trading

There have been several reports of recent crackdowns by India's capital markets regulator, Securities and Exchange Board of India (SEBI) on companies and individuals that were found to be involved in insider trading, front...more

How Pharmaceutical Companies Can Manage Data-Integrity Challenges

Human health is a fundamental need of the society. The pharmaceutical industry has played a pivotal role in providing mankind with drugs for preventive and curative care. COVID-19 has further underscored the immense...more

36 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide