TÜV Rheinland Blog - Insights from Asia and Africa
Latest Posts

An Integrated Approach to Functional Safety and Cybersecurity

How can safety and security be jointly assessed to resolve conflicts, and what role can bowtie analysis play to realise the vision of integrated safety and security? These were the topics discussed ...
Read More 

What to Do When Automated Application Security Testing Falls Short

As the number of applications developed explodes, the prospect of performing Application Penetration Testing on each application, with limited budgets and scarce resources, becomes increasingly ...
Read More 

TÜV Rheinland IoT Excellence Center Grand Opening

TÜV Rheinland, a global leader for independent inspection services, unveiled the plaque for its Internet-of-Things (IoT) Excellence Center in Longhua, Shenzhen to mark its official opening. Top ...
Read More 

Your Operational Technology. Protected.

Risk Assessments on Cybersecurity for Industrial and Operational Techology (OT) The number of cybersecurity related incidents in OT and industrial networks has risen in every sector in recent years, ...
Read More 

TŰV Rheinland Celebrates Data Privacy Rights on Privacy Awareness Week Exhibits at the 1st National Data Privacy Conference

Since the formal implementation of the Data Privacy Act in the Philippines recently, data breaches andother data privacy-related violations committed by some of the most respected local brands in the ...
Read More 

TUV Rheinland and OpenSky: Cybersecurity Trends

How can businesses better protect themselves from the increasing volume and complexity of cyberattacks while preparing for the opportunities of automation and digitalization of industries? TÜV ...
Read More 

Incorporating Cybersecurity in Safety Case

Leading regulations and standards, such as the Safety Case requirement in Singapore, emphasize that Major Hazard Installation (MHI) operators should take into account all likely risks, and these must ...
Read More 

Phishing your way Past Multi-Factor Authentication

Let’s say an attacker gains access to a valid set of employee credentials. If you don’t have multi-factor authentication (MFA) in place, the attacker has hit the jackpot. They can quickly ...
Read More 

Enabling IOT and Cyber Security

The Internet of Things (IoT) is increasingly influencing how people and everyday things interact via the Internet. Find out what are some of the top trends in IoT development in a snapshot:
Read More 

Understanding the Safety of Collaborative Robots

Whenever it is feasible to utilize robots in the factory, manufacturers will often find that option irresistible. It is universally agreed that robotics technology has enabled significant ...
Read More 

Posts by Topic

View More