TÜV Rheinland Blog - Insights from Asia and Africa
Latest Posts

How To Conduct a Self-Assessment to Find Gaps in Your Cybersecurity Framework

The first part of any problem is knowing that there is a problem. One technique to identify problems in the information security space is with the use of a NIST CSF assessment.
Read More 

It’s Never Too Late To Get Started In Cybersecurity

"It’s never too late to get started in cybersecurity,” says TÜV Rheinland’s Tarun Gupta, Principal Consultant, Industrial & OT Cybersecurity India, Middle East, Africa and Asia Pacific. “However, ...
Read More 

Your Operational Technology, Protected

A Trend Overview of Industrial and Operational Technology (OT) Cybersecurity The number of cybersecurity-related incidents in industrial security and industrial control networks has risen in every ...
Read More 

The Evolution of Cybersecurity Risk Management

In our increasingly connected world, when it comes to threat landscape and business risks, we face unprecedented challenges.
Read More 

How To Ensure Data Protection for Products in the Internet of Things (IoT)

The Growing Demand for Data Security in IoT Products More and more products are being equipped with an Internet connection. From smart TVs and digital assistants, to fitness trackers and networked ...
Read More 

Successful Business Continuity Management (BCM) Needs a Comprehensive Approach

Successful Business Continuity Management (BCM) requires identifying critical business processes and deriving required measures for reducing the probability of failure occurrence or getting systems ...
Read More 

The Evolution of Cybersecurity Risk Management

In our increasingly connected world, when it comes to threat landscape and business risks, we face unprecedented challenges. In the next three years, IoT devices are expected to grow to 30 billion. ...
Read More 

The ‘Privacy by Design’ Framework - and How It Can Create More Organisational Value

Back in the mid-90s, the former Canadian Information and Privacy Officer (Ontario), Ann Cavoukian, developed what has been called the Privacy by Design (“PbD”) Framework. The aim was to derive a set ...
Read More 

An Integrated Approach to Functional Safety and Cybersecurity

How can safety and security be jointly assessed to resolve conflicts, and what role can bowtie analysis play to realise the vision of integrated safety and security? These were the topics discussed ...
Read More 

What to Do When Automated Application Security Testing Falls Short

As the number of applications developed explodes, the prospect of performing Application Penetration Testing on each application, with limited budgets and scarce resources, becomes increasingly ...
Read More 

Posts by Topic

View More