Quantcast
Channel: CyRAACS
Browsing all 23 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Difference Between CBDC and UPI

Will India’s CBDC i.e e-Rupee compete with UPI and Wallets? The Reserve Bank of India (RBI) announced the launch of the first pilot for retail digital Rupee (e₹-R) on December 01, 2022. It has...

View Article


GISEC 2023 Shaping the Future of Cybersecurity with Innovative Solutions

GISEC 2023 is one of the largest cybersecurity events in the world, set to take place in Dubai on March 14, 2023 to March 16, 2023. This event is significant in the field of cybersecurity because it...

View Article

Cyber Security And Cyber Resilience Framework For Portfolio Managers - From SEBI

What do you mean by a portfolio manager Portfolio managers are professionals/ entities responsible for managing investment portfolios on behalf of clients or organizations. They make investment...

View Article

Image may be NSFW.
Clik here to view.

RBI: Master Direction on Outsourcing of Information Technology Services

RBI/2023-24/102 DoS.CO.CSITEG/SEC.1/31.01.015/2023-24                                                                                    10th April 2023 Summary of the Circular: Regulated Entities...

View Article

Top 5 Priorities for CISOs in 2023

The cybersecurity landscape is constantly evolving, and CISOs need to be prepared to defend against increasingly sophisticated attacks.  Here are five top priorities for CISOs in 2023: 1. Safeguard...

View Article


Will passkeys be the future and can we forget passwords?

What is a Passkey? Passkey is a new way to sign in to websites and apps that are secure and easier to use than passwords. Passkeys use public-key cryptography to create a unique key pair for each...

View Article

Image may be NSFW.
Clik here to view.

Draft Master Directions on Cyber Resilience and Digital Payment Security...

India's digital payment ecosystem has witnessed exponential growth in recent years, providing convenience and accessibility to millions of users. However, as the digital landscape expands, so does the...

View Article

Digital Personal Data Protection Act – India (DPDP Act) - August 2023

Lok Sabha passed the Digital Personal Data Protection Act – India (DPDP Act) - August 2023, India’s 2nd attempt in framing privacy legislation. The Journey of the Bill  Aug 2017: Privacy as a...

View Article


Image may be NSFW.
Clik here to view.

API Security: A Comprehensive Guide to Protecting Your Digital Assets

Application Programming Interface or API serves as a data connection that facilitates the sharing of data with other applications. In today's rapidly evolving digital landscape, Application...

View Article


Image may be NSFW.
Clik here to view.

Guidelines for Secure Application Design, Development, Implementation, and...

One of the key reasons for vulnerabilities in the applications are lack of secure design, development, implementation, and operations. Insecure application development is a primary cause of...

View Article

A Comprehensive Guide to Internal Audit and Cybersecurity: Enhancing...

In today's dynamic business landscape, internal audit plays an even more critical role due to the complexities and the increased emphasis on cybersecurity. It goes beyond mere compliance and extends...

View Article

How to get ISO 27001 and SOC2 certified for startups

In the ever-evolving world of IT, security has become a necessity more than a precautionary decision or a luxury that most organizations overlook. With the ever-increasing sophistication of...

View Article

PCI DSS Certification Readiness Simplified

In today's digital age, where data is the lifeblood of business operations, protecting sensitive financial information has never been more critical. The Payment Card Industry Data Security Standard...

View Article


Unlocking the Potential of Cybersecurity: The Key to Gap Assessment

In the ever-evolving realm of cybersecurity, organizations face an unceasing challenge to secure their digital fortresses. A mid-sized financial services firm prides itself on its commitment to...

View Article

Getting Started With your GRC Journey

Embarking on the journey of Governance, Risk Management, and Compliance (GRC) is a significant step for any organization in today's complex and highly regulated business environment. To thrive and...

View Article


Image may be NSFW.
Clik here to view.

The rudimentary differences between an ISO 27001 Certification and a SOC2...

Introduction In today’s ever-evolving cyber and risk landscape, information security has come to the forefront to combat the sophistication of cyberattacks and the constantly changing technology...

View Article

Decoding GDPR Compliance – A complete guide to understanding the Law and...

Introduction The General Data Protection Regulation is a law that was enacted in 2018, it has transformed the way businesses worldwide handle and protect personal data. With stringent requirements for...

View Article


DPDPA Decoded: A Comprehensive Guide to the Digital Personal Data Protection Act

In the age of digitalization, where personal data has become a valuable commodity, the need for robust data protection laws has become increasingly crucial. Recognizing this need, India has enacted...

View Article

Image may be NSFW.
Clik here to view.

Ensuring Compliance and Security: A Comprehensive Guide to Achieving ISO...

1. Purchasing ISO 27001 document – Your organization must purchase the ISO 27001 document and understand how to implement a structed ISMS for your organization. This will help your organization to...

View Article

Conducting a Risk Assessment: A Practical Guide for Organizations

Information security is a critical concern for organizations in the digital age, as the proliferation of data and technology brings new vulnerabilities and threats. To safeguard sensitive information,...

View Article
Browsing all 23 articles
Browse latest View live