Displaying 10 out of 35 results

  1. China implemented a controversial cybersecurity law on June 1 is largely aimed at protecting the

    Commentary: China’s great leap forward in data protection

    Policymakers in Beijing have moved forward in articulating a nationwide data protection scheme with implications for internet users, businesses, ...
  2. man using phone

    Commentary: If only privacy agreements were readable. Most aren't

    The GDPR requires companies to use clear and plain language in privacy agreements, but readability remains a challenge, says Victoria University's ...
  3. Silhouettes of laptop users are seen next to a screen projection of Microsoft logo in this picture

    Microsoft says discovers hacking targeting democratic institutions in Europe

    Microsoft Corp on Wednesday said it will offer its cyber security service AccountGuard to 12 new markets in Europe including Germany, France and ...
  4. FILE PHOTO - The Symantec logo is pictured on a screen

    Symantec acquires Israel's Luminate, with an eye on cloud security

    Cyber security firm Symantec Corp said on Tuesday it acquired Israel's Luminate Security in an effort to boost its security systems for cloud ...
  5. A sign of Huawei is pictured at its shop in Beijing

    Huawei offers to launch cyber security centre in Poland

    Huawei, the world's biggest producer of telecommunications equipment, offers to launch a cyber security centre in Poland, Tonny Bao, the head of ...
  6. smartphone, iphone, icons

    Commentary: Tech firms don't need to spy on you - they already gather enough info from your personal data

    Tech firms already have an excellent idea of what your interests, desires and habits might be from the way you use their products, says Jason ...
  7. Losing Yourself
    Media playtime

    Ep 9: Losing Yourself

    Is free wifi safe to use? Can 'secured' websites be faked? Is your personal information really worth stealing? In his hunt for answers, host ...
  8. S Iswaran

    Commentary: The SingHealth breach and the uphill task of governing cyberspace

    Anonymity, long-distance penetration and the quality of stealth suggest a very different international order is at play in cyberspace, says one ...