TÜV Rheinland Blog - Insights from Asia and Africa
Latest Posts

How To Reduce IT Risks and Control Information Security with ISO/IEC 27001

  What is an ISMS? An information security management system, or ISMS for short, according to ISO / IEC 27001 provides high information security with appropriate effort. Together, we identify, ...
Read More 

Cybersecurity Trend 2019: The Skills Shortage Will Distort The Labour Market

  The surge in the importance of cybersecurity has come at a time when the skills required to strengthen it are in critically short supply. By 2020, globally this shortage could reach 1.5 million, ...
Read More 

How To Conduct a Self-Assessment to Find Gaps in Your Cybersecurity Framework

The first part of any problem is knowing that there is a problem. One technique to identify problems in the information security space is with the use of a NIST CSF assessment.
Read More 

It’s Never Too Late To Get Started In Cybersecurity

"It’s never too late to get started in cybersecurity,” says TÜV Rheinland’s Tarun Gupta, Principal Consultant, Industrial & OT Cybersecurity India, Middle East, Africa and Asia Pacific. “However, ...
Read More 

Your Operational Technology, Protected

A Trend Overview of Industrial and Operational Technology (OT) Cybersecurity The number of cybersecurity-related incidents in industrial security and industrial control networks has risen in every ...
Read More 

The Evolution of Cybersecurity Risk Management

In our increasingly connected world, when it comes to threat landscape and business risks, we face unprecedented challenges.
Read More 

How To Ensure Data Protection for Products in the Internet of Things (IoT)

The Growing Demand for Data Security in IoT Products More and more products are being equipped with an Internet connection. From smart TVs and digital assistants, to fitness trackers and networked ...
Read More 

The Evolution of Cybersecurity Risk Management

In our increasingly connected world, when it comes to threat landscape and business risks, we face unprecedented challenges. In the next three years, IoT devices are expected to grow to 30 billion. ...
Read More 

The ‘Privacy by Design’ Framework - and How It Can Create More Organisational Value

Back in the mid-90s, the former Canadian Information and Privacy Officer (Ontario), Ann Cavoukian, developed what has been called the Privacy by Design (“PbD”) Framework. The aim was to derive a set ...
Read More 

An Integrated Approach to Functional Safety and Cybersecurity

How can safety and security be jointly assessed to resolve conflicts, and what role can bowtie analysis play to realise the vision of integrated safety and security? These were the topics discussed ...
Read More 

Posts by Topic

View More