TÜV Rheinland Blog - Insights from Asia and Africa
Latest Posts

Your Operational Technology, Protected

A Trend Overview of Industrial and Operational Technology (OT) Cybersecurity The number of cybersecurity-related incidents in industrial security and industrial control networks has risen in every ...
Read More 

The Evolution of Cybersecurity Risk Management

In our increasingly connected world, when it comes to threat landscape and business risks, we face unprecedented challenges.
Read More 

How To Ensure Data Protection for Products in the Internet of Things (IoT)

The Growing Demand for Data Security in IoT Products More and more products are being equipped with an Internet connection. From smart TVs and digital assistants, to fitness trackers and networked ...
Read More 

Successful Business Continuity Management (BCM) Needs a Comprehensive Approach

Successful Business Continuity Management (BCM) requires identifying critical business processes and deriving required measures for reducing the probability of failure occurrence or getting systems ...
Read More 

The Evolution of Cybersecurity Risk Management

In our increasingly connected world, when it comes to threat landscape and business risks, we face unprecedented challenges. In the next three years, IoT devices are expected to grow to 30 billion. ...
Read More 

The ‘Privacy by Design’ Framework - and How It Can Create More Organisational Value

Back in the mid-90s, the former Canadian Information and Privacy Officer (Ontario), Ann Cavoukian, developed what has been called the Privacy by Design (“PbD”) Framework. The aim was to derive a set ...
Read More 

An Integrated Approach to Functional Safety and Cybersecurity

How can safety and security be jointly assessed to resolve conflicts, and what role can bowtie analysis play to realise the vision of integrated safety and security? These were the topics discussed ...
Read More 

What to Do When Automated Application Security Testing Falls Short

As the number of applications developed explodes, the prospect of performing Application Penetration Testing on each application, with limited budgets and scarce resources, becomes increasingly ...
Read More 

The Myth of the Operational Technology Air Gap

The cybersecurity field of operational technology (OT) is buzzing as companies increasingly realise that their production systems, manufacturing plants, chemical processing plants, or industrial ...
Read More 

Success with Industrial Security in Oman

According to the UN, Oman is one of the economically most successful states of the last 40 years as well as one of the most industrialized states in the Persian Gulf. Hacker attacks on critical ...
Read More 

Posts by Topic

View More