Governance, Risk, and Compliance (GRC) plays a pivotal role in organizational success by providing a structured and integrated approach to managing an organization's overall performance, addressing risks, and adhering to
In today's digital age, where data is the lifeblood of business operations, protecting sensitive financial information has never been more critical. The Payment Card Industry Data Security Standard (PCI DSS) was established to ensure the secure handling of card data, and compliance with this standard is mandatory for any organization that processes cardholder information. Achieving PCI DSS certification can be a daunting task, but with a simplified approach, it becomes an achievable goal. In this article, we'll break down the process of PCI DSS certification readiness and provide practical guidance to simplify this complex journey.
Understanding the basics of PCI DSS is crucial before we begin the certification preparedness process. A set of security regulations called the Payment Card Industry Data Security Standard is intended to safeguard cardholder data. It is applicable to any company that handles, maintains, or sends card data. An organization's dedication to data security and adherence to industry standards is demonstrated by its PCI DSS certification. Twelve high-level requirements make up PCI DSS, which is then broken down into multiple sub-requirements. These specifications address a number of data security-related topics, such as access control, network security, encryption, and routine testing and monitoring. It takes a methodical and thorough approach to meeting these requirements in order to achieve compliance.
Is it only credit card or any card data? all card data. High-Level or just 12 requirements make it up? These are not 12 control requirements but an overall breakdown of the certification into 12 phases.
1. Know Your Scope
Determining the extent of your cardholder data environment is the first step toward being prepared for PCI DSS certification. This entails figuring out which people, systems, and procedures have access to card data. Knowing your scope is important since it determines how much work you have to put into complying with regulations.
Your scope can be restricted to particular web servers and payment processing apps, for instance, if your company solely handles card payments online and doesn't keep track of cardholder information. However, your scope will be wider and include data handling and storage systems if you keep cardholder data for recurrent transactions.
2. Identify Applicable Requirements
Determine the precise PCI DSS criteria that apply to your organization after determining your scope. Depending on your scope and how you manage cardholder data, the rules could change.
For example, you will need to concentrate on encryption, access control, and routine security testing if your scope involves storing cardholder data. Certain criteria might not apply if your scope is restricted to processing card transactions without data storage.
3. Conduct a Gap Analysis
A gap analysis is a critical step in assessing your organization's current state of compliance with PCI DSS requirements. This involves comparing your existing security practices and policies to the standard's requirements.
During the gap analysis, identify areas where your organization is already in compliance and areas where improvements or adjustments are needed. This analysis serves as a roadmap for prioritizing compliance efforts.
4. Develop a Compliance Plan
Based on the results of your gap analysis, create a compliance plan that outlines the specific actions needed to address non-compliance areas. Assign responsibilities and set deadlines to ensure that everyone involved understands their role in achieving compliance.
Your compliance plan should include a combination of technical, procedural, and policy changes to align your organization with PCI DSS requirements. It may involve implementing firewalls, encryption measures, access controls, and security policies, among other things.
5. Implement Security Measures
With your compliance plan in hand, begin implementing the necessary security measures. This could involve configuring firewalls, deploying intrusion detection systems, and encrypting sensitive data. Ensure that all changes align with the PCI DSS requirements and secure your cardholder data environment.
6. Regularly Monitor and Test
Continuous monitoring and testing are essential components of PCI DSS compliance. Regularly assess your security controls, conduct vulnerability scans, and perform penetration testing to identify and address any vulnerabilities or weaknesses in your systems.
Monitoring and testing should be ongoing to maintain a high level of security. This ensures that your organization remains vigilant and responsive to emerging threats.
7. Document Your Compliance Efforts
Proper documentation is a fundamental aspect of PCI DSS certification readiness. Maintain records of your compliance plan, security measures, monitoring and testing results, and any security incidents or breaches. Detailed records will be essential during the certification process to demonstrate your organization's commitment to data security.
8. Engage a Qualified Security Assessor (QSA)
To achieve PCI DSS certification, you'll need to engage a Qualified Security Assessor (QSA). A QSA is an independent security firm certified by the PCI Security Standards Council to assess and validate your compliance with the standard.
The QSA will conduct an assessment of your organization's processes, controls, and documentation to determine if you meet the PCI DSS requirements. This assessment includes an on-site visit, interviews with key personnel, and a review of your compliance documentation.
9. Submit a Report on Compliance (ROC)
Following the assessment by the QSA, you'll be required to submit a Report on Compliance (ROC). This report details the results of the assessment and serves as the formal documentation of your PCI DSS compliance.
The ROC includes information about your organization's scope, security measures, monitoring and testing results, and compliance efforts. It provides an overview of how you've addressed each requirement.
10. Maintain Ongoing Compliance
Achieving PCI DSS certification is a significant accomplishment, but it's not a one-time effort. To maintain certification, continue to follow the steps outlined above. Regularly update your security measures, conduct monitoring and testing, and engage with your QSA for annual assessments and ROC submissions.
COMPASS, a specialized lightweight platform, enhances your Internal Audit and external audit processes and user experience. Some of the benefits of using COMPASS include:
PCI DSS certification readiness can seem overwhelming, but by breaking it down into manageable steps and understanding your organization's specific scope and requirements, you can simplify the process. It's essential to engage with experts, maintain a proactive stance on security, and document your efforts throughout the journey. Ultimately, achieving PCI DSS certification is not only a regulatory requirement but also a demonstration of your commitment to protecting sensitive financial information and maintaining trust with your customers.
In the ever-evolving world of IT, security has become a necessity more than a precautionary decision or a luxury that most organizations overlook. With the ever-increasing sophistication of cyberattacks, businesses are constantly seeking ways to safeguard their sensitive information and protect their customers' trust. Two widely recognized information security standards stand out in this arena: ISO 27001 and SOC 2. As a startup looking at certifications from ISO accredited bodies or attestations from CPAs (Certified Public Accountant) will give your organization the head-start it needs in the ever-evolving world of cyberthreats. ISO and SOC2 follow essentially two different paths for certification/attestation respectively, ISO 27001 is an international standard for Information Security Management Systems (ISMS). It provides a systematic approach for managing information security risks. Whereas SOC 2 (Service Organization Control 2) is a framework developed by the American Institute of CPAs (AICPA) specifically for service organizations. It focuses on five trust service principles: security, availability, processing integrity, confidentiality, and privacy. SOC2 is essential for Service providing organizations across all industries, as it focuses on specialization of protection of service organizations that handle customer data. While ISO is a prescriptive standard that can be applied to any organization in any industry, it focuses on developing and maintain an ISMS framework in the organization and how well it is being maintained. The fundamental distinctions have been called out in detail in the Blog: The rudimentary differences between an ISO 27001 Certification and a SOC2 Certification.
As a startup, compliance with either of the standards will help your business in the following ways:
For a startup, having either certificate or attestation for ISO 27001 or SOC2 is a task that can be achieved rather easily as the systems, processes and technologies being adopted in the organization are rather nascent and can be molded according to the minimum requirements set by either standards. The certification or attestation can be achieved from scratch by following the below mentioned steps:
COMPASS, a specialized lightweight platform developed by CyRAACS, enhances your Internal Audit and external audit processes and user experience. Some of the benefits of using COMPASS include:
In conclusion, ISO 27001 and SOC 2 compliance are achievable for startups with the right approach and commitment. ISO 27001 and SOC 2 compliance are achievable goals for startups, even with limited resources. These certifications not only bolster your information security but also provide a competitive edge and instill trust in clients and investors. By following the steps outlined in this guide and maintaining a commitment to continuous improvement, your startup can successfully navigate the path to compliance and reap the associated benefits.
In today's dynamic business landscape, internal audit plays an even more critical role due to the complexities and the increased emphasis on cybersecurity. It goes beyond mere compliance and extends to strategic contributions for enhancing governance, risk management, and security. This comprehensive guide delves into the realm of internal audit, covering its definition, objectives, scope, procedures, best practices, and its impact on information security (infosec) and overall organizational performance.
Internal audit is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations. It helps organizations accomplish their objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control, and governance processes. Internal auditors are responsible for providing insights, recommendations, and assurance on the organization's operations.
The primary objectives of internal audit are as follows:
To conduct effective internal audits, consider the following best practices:
COMPASS, a specialized lightweight platform, enhances your Internal Audit and external audit processes and user experience. Some of the benefits of using COMPASS include:
Internal audit is a crucial function that contributes to an organization's success by ensuring effective governance, risk management, and compliance. By following best practices, adopting a risk-based approach, and using data analytics, internal auditors can provide valuable insights and recommendations for process improvements. Whether you are an internal auditor, a member of senior management, or simply interested in understanding the inner workings of organizations, this guide provides a comprehensive overview of the significance and processes involved in internal audit. Embracing internal audit as a strategic asset can lead to better governance and ultimately improved organizational performance.
One of the key reasons for vulnerabilities in the applications are lack of secure design,
development, implementation, and operations. Insecure application development is a primary cause of cyberinfrastructure vulnerabilities. Relying solely on post-development audits for security is insufficient. Security should be an integral part of the application's design and development process, with built-in measures to guard against security breaches and exploitation.
Once secure application design and development guidelines are implemented, the application can undergo source-code reviews and black-box testing by a CERT-In empaneled auditing organization to detect any shortcomings or vulnerabilities in security practices.
As per the guidelines issued by the Indian Computer Emergency Response Team (CERT-In), organizations involved in application development, especially government entities, need to establish a strong and secure application security foundation during the development process.
Applications lacking secure design and development practices are not suitable for assessments and audits. Both auditee and auditor organizations must ensure that the application adheres to secure practices before starting any assessments.
This method is essential for guaranteeing the security of the application from the very beginning and progressively enhancing each stage of the application development lifecycle.
The main aim is to create systems that are inherently secure, resilient, and resistant to security
threats, vulnerabilities, and attacks. Organizations should incorporate security as a key component of the development process ensuring compliance with global standards. This reduces the likelihood of security breaches by protecting sensitive data and delivering secure and reliable software.
The secure software development life cycle (SDLC), an approach that integrates security practices throughout the life cycle, encompasses various models and frameworks, including -
Designers and developers involved in application development must possess a comprehensive understanding of the cyber security fundamentals and practical knowledge of the security principles governing secure application development.
Effective data protection and privacy require a comprehensive strategy. This includes integrating -
Adhering to these guidelines is paramount in our ever-evolving digital landscape. They fortify our applications against cyber threats by embedding security from project inception to the application's lifecycle. This commitment safeguards data, upholds user trust, and enhances digital security. Let these guidelines lead us to a safer digital future, laying the foundation for secure and resilient applications in a security-conscious world.
Application Programming Interface or API serves as a data connection that facilitates the sharing of data with other applications. In today's rapidly evolving digital landscape, Application Programming Interfaces (APIs) are pivotal in connecting various software applications, enabling seamless data exchange, and powering countless online services.
While APIs offer unparalleled efficiency and flexibility, they also introduce a significant security challenge. The importance of securing APIs cannot be overstated, as they serve as gateways to your digital assets and sensitive information.
APIs can simplify app development and integration of multiple product functionalities, saving time and money while providing a seamless user experience. While designing new tools and products, APIs provide flexibility, ease of usage and they play a central role in both mobile commerce and the Internet of Things (IoT).
Usage of APIs has increased significantly in the past few years. Akamai estimates that roughly 83% of internet traffic is being driven by APIs. Further, according to the Slashdata survey, which offers several granular insights into how developers use APIs, nearly 90% of developers are using APIs in some capacity.
With an exponential growth in the number of API calls, there is an aggressive increase in abuse of these APIs. Gartner predicts that 90% of web-enabled applications will have broader attack surfaces due to exposed APIs. The latest study from Imperva claims that vulnerable APIs are costing organizations between $40 and $70 billion annually.
Due to their direct access to extremely sensitive data and functionality, APIs are frequently cited as one of the primary security concerns that organizations face. APIs are changing the landscape of financial services and playing a critical role in the rise of Fintech and Open Banking. banks are in a position to provide better customer experience and develop new revenue streams by relying on banking APIs. APIs have opened doors to technologies such as P2P payments and cryptocurrency exchanges. However, with this rise of digitization and API usage in the financial sector along with the availability of sensitive customer information, the financial industry is also becoming a preferred target for API attacks. Indian Financial Sector since 2021 has observed a consistent rise in API attacks.
The most common API attacks can be listed as follows:
With the exponential growth in API usage, there has been a corresponding rise in API abuse. The transition from monolithic architectures to cloud-based microservices and containers has brought about a paradigm shift in development cycles but has also expanded the surface area of vulnerabilities exposed to the internet.
In the present day, APIs grant access to functionalities that were once confined within monolithic structures, resulting in a greater number of potential vulnerabilities to exploit. Additionally, the proliferation of endpoints available for interaction has amplified the attack surface. By following best practices for web application security and API security, you can significantly reduce the risk of attacks and enhance the overall security of your systems.
Lok Sabha passed the Digital Personal Data Protection Act – India (DPDP Act) - August 2023, India’s 2nd attempt in framing privacy legislation.
The Journey of the Bill
Aug 2017: Privacy as a fundamental right reaffirmed in Justice KS Puttaswamy vs Union of India by SC Justice Srikrishna Committee constituted to examine data protection issue
July 2018: Committee released a draft of the DPDP Bill and report
Dec 2017: The Joint Parliament Committee (JPC) released its report and new version of the law as the Data Protection Bill
Dec 2019: Revised draft bill sent to JPC
Aug 2022: Draft DPB Withdrawn
Nov 2022 Meity released a draft DPDP Bill for Public Consultation
July 2023: Union Cabinet approves the draft
Aug 2023: The Digital Personal Data Protection Act – India (DPDP Act) was passed and a law was initiated
Introduction to DPDP Act – August 2023
🔒 Introducing the Digital Personal Data Protection Act (DPDP) – Safeguarding Privacy in India 🇮🇳
In a significant stride towards bolstering digital privacy, India has unveiled the groundbreaking Digital Personal Data Protection Act (DPDP) in August 2023. This landmark legislation aims to empower individuals with greater control over their personal data while establishing stringent regulations for its collection, storage, and utilization by businesses and organizations.
Under the DPDP Act, entities collecting personal data are mandated to obtain explicit consent from users, outlining the purpose and duration of data usage. The Act also encompasses provisions for data localization, ensuring that critical personal data remains within Indian borders.
Furthermore, the DPDP Act introduces a Data Protection Authority (DPA) responsible for monitoring and enforcing compliance with the law. Non-compliance could result in substantial fines, emphasizing the government's commitment to fostering a responsible data ecosystem.
As the DPDP Act comes into effect, it heralds a new era of digital privacy, giving citizens greater control and confidence in their online interactions.
What are the key features of the bill?
Penalty | Reason |
Rs 200 crore | Non fulfilment of obligations for children |
Rs 250 crore | Failure to take security measures to prevent data breaches |
India's digital payment ecosystem has witnessed exponential growth in recent years, providing convenience and accessibility to millions of users. However, as the digital landscape expands, so does the need for robust cybersecurity measures. To address this critical aspect, the Reserve Bank of India (RBI) has introduced a draft master direction that covers various domains of cyber resilience and digital payment security. This blog explores the key areas emphasized in the draft and the significance they hold in developing a secure digital payment ecosystem in India.
Regulated Entity | Entities applicable for | Timeline for implementation |
Large non-bank PSOs | Clearing Corporation of India Limited (CCIL), National Payments Corporation of India (NPCI), NPCI Bharat Bill Pay Limited, Card Payment Networks, Non-bank ATM Networks, White Label ATM Operators (WLAOs), Large PPI Issuers, Trade Receivables Discounting System (TReDS) Operators, Bharat Bill Payment Operating Units (BBPOUs) and Payment Aggregators (PAs) | 1st April 2024 |
Medium non-bank PSOs | Cross-border (in-bound) Money Transfer Operators under Money Transfer Service Scheme (MTSS) and Medium PPI Issuers | 1st April 2026 |
Small non-bank PSOs | Small PPI Issuers and Instant Money Transfer Operators | 1st April 2028 |
The draft directions aim to provide a comprehensive framework for the governance, risk management, security controls, incident response, audit and compliance of the PSOs with respect to cyber resilience and digital payment security. They also specify baseline security measures for ensuring safe and secure digital payment transactions, such as encryption, authentication, access control, monitoring and reporting.
To effectively manage information security risks, PSOs must establish a proactive approach at the highest level of governance. The Board of Directors assumes the responsibility of overseeing information security risks, including cyber risk and cyber resilience. A board-approved Information Security (IS) policy should be formulated, covering all applications and products related to payment systems. This policy will serve as a roadmap for managing potential risks and addressing any materialized threats.
PSOs need to develop a robust risk management framework to identify, assess, monitor, and manage cybersecurity risks. Periodic risk assessments should be conducted to identify the sources and magnitude of cyber threats and vulnerabilities. These assessments will enable PSOs to implement appropriate risk mitigation measures, thereby reducing the potential impact of security incidents.
Implementing adequate security controls is crucial for protecting the confidentiality, integrity, and availability of information assets and payment systems. PSOs must establish a comprehensive set of security controls covering various aspects, such as physical security, network security, application security, data security, endpoint security, cloud security, cryptography, identity and access management, malware protection, patch management, backup and recovery. These controls work in tandem to create multiple layers of defense against potential threats.
PSOs should establish an effective incident response mechanism to detect, contain, analyze, respond to, and recover from cyber incidents. Swift detection and containment of incidents can help minimize their impact. PSOs must also adhere to prescribed timelines and formats to report cyber incidents to regulatory authorities, such as the RBI. Conducting thorough root cause analysis enables PSOs to identify vulnerabilities and implement corrective and preventive measures to prevent similar incidents in the future.
Regular internal and external audits are essential to assess the adequacy and effectiveness of a PSO's cyber resilience and digital payment security framework. Audits should encompass all aspects of the framework, including policies, procedures, processes, systems, controls, and compliance. The findings and recommendations from these audits serve as valuable inputs for the Board and senior management to take necessary actions and strengthen the security posture further.
Adhering to applicable laws, regulations, standards, and guidelines is a fundamental aspect of cyber resilience and digital payment security. PSOs must ensure compliance and proactively monitor changes in the regulatory landscape. Regular updates to the framework based on evolving requirements will help maintain a robust security posture. PSOs should submit periodic compliance reports to regulatory authorities, such as the RBI, as per the prescribed frequency and format.
RBI aims to mitigate cyber risks and promote a culture of cyber resilience among PSOs. Implementing these measures will help safeguard customer data, prevent cyber incidents, and foster trust in digital payment systems, contributing to the nation's digital transformation journey.
Establishing a strong cybersecurity framework is imperative for Payment System Operators to ensure cyber resilience and protect digital payment systems. By implementing effective governance, robust risk management practices, comprehensive security controls, efficient incident response mechanisms, thorough audits, and strict compliance measures, PSOs can mitigate risks and enhance the security of payment systems. This comprehensive approach strengthens the trust of customers and stakeholders in the digital payment ecosystem, paving the way for secure and seamless transactions in the digital era.
Please reach out to us to know more about this at [email protected]
Passkeys are a promising new technology that has the potential to make online security much stronger and user experience simpler.
Passkeys are a significant improvement over passwords. They are faster, more secure, and more convenient. Many brands will follow in supporting passkeys. I expect passkeys to become the standard for login security in the near future like how 2FA was adopted in the past.
Designate a specific mobile device with good biometrics as your go-to authenticator using passkeys. Also, you can easily transfer your passkeys to the new device (whenever you upgrade).
Overall, Passkeys are a much more secure and convenient way to sign in to websites and apps. Looks like the future of password-less authentication.
Will passkeys be the future? Let us know: Contact us. We are a CERT-IN Empanelled cyber security company based out of Bangalore. We are a CERT-IN Empanelled cyber security company based out of Bangalore.
The cybersecurity landscape is constantly evolving, and CISOs need to be prepared to defend against increasingly sophisticated attacks.
1. Safeguard critical infrastructure from advanced attacks: CISOs must prioritize the protection of vital systems such as power grids, water networks, and transportation infrastructures, which face an escalating risk of cyber attacks.
2. Minimize the attack surface: CISOs should focus on reducing vulnerabilities within their organization by identifying and resolving potential entry points that can be exploited by attackers.
3. Enhance security awareness and training: Recognizing that employees are often the weakest link in security, CISOs need to concentrate on improving security awareness and providing comprehensive training programs to empower employees in identifying and mitigating security threats.
4. Embrace security automation: CISOs can enhance operational efficiency and effectiveness by implementing automation solutions for tasks like vulnerability scanning and incident response. This allows CISOs to dedicate more time to strategic initiatives.
5. Foster a robust security culture: Establishing a strong security culture is imperative for organizations to defend against cyber threats. CISOs should collaborate with leadership and employees to cultivate an environment of heightened security awareness and individual responsibility.
a) The increasing prominence of artificial intelligence (AI) and machine learning (ML) technologies.
b) The growing adoption of cloud computing services.
c) The proliferation of Internet of Things (IoT) devices.
d) The escalating frequency of cyber attacks targeting small and medium-sized businesses (SMBs).
By effectively addressing these challenges, CISOs can position their organizations to successfully mitigate cyber threats in 2023 and beyond.
What are your top cybersecurity priorities for 2023? Let us know: Contact us
RBI/2023-24/102
DoS.CO.CSITEG/SEC.1/31.01.015/2023-24 10th April 2023
Summary of the Circular:
Regulated Entities (REs) outsource a substantial portion of their IT activities to third parties, which exposes them to various risks. In order to ensure effective management of such risks, RBI issued a draft Master Direction on Outsourcing IT Services in June 2022. Based on the feedback received, RBI released a finalized version of Master Direction on Outsourcing of Information Technology Services on April 10, 2023.
Applicability of the Circular:
These Directions shall be applicable to the following entities, collectively referred to as ‘regulated entities’ or ’REs’:
Implementation Schedule for the Circular:
The master directions shall be effective from 1st October 2023.
Key Pointers from the Master Direction:
Governance, Risk, and Compliance (GRC) plays a pivotal role in organizational success by providing a structured and integrated approach to managing an organization's overall performance, addressing risks, and adhering to
Compliance with government laws, regulations, and rules is essential for all organizations. A regulatory requirement is a directive imposed by a government entity on an organization.
In today's dynamic business landscape, organizations face an ever-increasing array of challenges, from regulatory compliance and cybersecurity threats to operational risks and data privacy concerns. To navigate
Information security is a critical concern for organizations in the digital age, as the proliferation of data and technology brings new vulnerabilities and threats. To safeguard sensitive information, organizations must conduct information security risk assessments. This comprehensive guide will walk you through the key steps and best practices involved in
Purchasing ISO 27001 document – Your organization must purchase the ISO 27001 document and understand how to implement a structed ISMS for your organization. This will help your organization to understand why the controls are necessary and how they can be implemented to mitigate risks.
In the age of digitalization, where personal data has become a valuable commodity, the need for robust data protection laws has become increasingly crucial. Recognizing this need, India has enacted the Digital Personal Data Protection Act, 2023 (DPDPA), marking a significant milestone in the country's data
The General Data Protection Regulation is a law that was enacted in 2018, it has transformed the way businesses worldwide handle and protect personal data. With stringent requirements for data privacy and security, GDPR compliance is essential for organizations that collect, process, or store
In today’s ever-evolving cyber and risk landscape, information security has come to the forefront to combat the sophistication of cyberattacks and the constantly changing technology framework. Two widely recognized information security standards stand out in this arena: ISO 27001
Embarking on the journey of Governance, Risk Management, and Compliance (GRC) is a significant step for any organization in today's complex and highly regulated business environment. To thrive and ensure sustainable growth, businesses must proactively address governance issues, manage risks, and meet compliance requirements. In this article, we will guide you through the crucial steps […]
In the ever-evolving realm of cybersecurity, organizations face an unceasing challenge to secure their digital fortresses. A mid-sized financial services firm prides itself on its commitment to safeguarding customer data and financial assets. However, recent cyber threats have escalated, and the firm is keen to ensure that its cybersecurity defences remain
In today's digital age, where data is the lifeblood of business operations, protecting sensitive financial information has never been more critical. The Payment Card Industry Data Security Standard (PCI DSS) was established to ensure the secure handling of card data, and compliance with this standard is mandatory for any organization that processes cardholder information. Achieving […]
In the ever-evolving world of IT, security has become a necessity more than a precautionary decision or a luxury that most organizations overlook. With the ever-increasing sophistication of cyberattacks, businesses are constantly seeking ways to safeguard their sensitive information and protect their customers' trust. Two widely recognized information security standards stand out in this
In today's dynamic business landscape, internal audit plays an even more critical role due to the complexities and the increased emphasis on
One of the key reasons for vulnerabilities in the applications are lack of secure design,
development, implementation, and operations.
Application Programming Interface or API serves as a data connection that facilitates the sharing of data with other applications. In today's rapidly evolving digital landscape,
Lok Sabha passed the Digital Personal Data Protection Act – India (DPDP Act) - August 2023 , India’s 2nd attempt in framing a privacy legislation.Aug 2017: Privacy as a fundamental right reaffirmed in Justice KS Puttaswamy vs Union of India by SC Justice Srikrishna Committee constituted to examine data
The Reserve Bank of India (RBI) has introduced a draft master direction that covers various domains of cyber resilience and digital payment security.
Passkeys are a significant improvement over passwords. They are faster, more secure, and more convenient. Many brands will follow in supporting passkeys. I expect passkeys to become the standard for login security in the near future like how 2FA was adopted in the past.
The cybersecurity landscape is constantly evolving, and CISOs need to be prepared to defend against increasingly sophisticated attacks.
Regulated Entities (Res) outsource a substantial portion of their IT activities to third parties, which exposes them to various risks. RBI released a finalized version of Master Direction on Outsourcing of Information Technology Services on April 10, 2023.
Portfolio managers work closely with their clients to understand their financial goals, risk tolerance, and investment preferences.
The GISEC 2023 event is scheduled to be held in Dubai World Trade Center, United Arab Emirates, on 14, 2023 to March 16, 2023.
The RBI announced the launch of the first pilot for retail digital Rupee (e₹-R) on December 01, 2022. It has commenced the pilot in the wholesale segment from November 2022.
An Account Aggregator shall transmit the financial data pertaining to the user only after receiving formal consent from the user
APIs are the backbone of the internet, powering the applications and services that we use every day
In order to protect your business from common cybersecurity threats, it is important to be aware of the different types of attacks that exist and how to prevent them
Read what RBI has to say on digital lending in the Guideline on Digital Lending issued on 2nd September 2022
The concept of BNPL is similar to that of credit cards wherein a consumer makes a purchase through a credit line and the payment is done later
Security Architecture Review is a holistic review of security that covers networks, Data, Applications, Endpoint, Cloud, etc.
Companies are realizing the benefits of cloud infrastructure. They are quicker to scale, cheaper to maintain, and more flexible.
Executive leaders of organizations and board members are ultimately responsible for ensuring the long-term security
With the year 2020 and the pandemic overwhelming us, we must be conscious of the increase in cyber security threats that are looming in front of us. Here are a few thoughts
Global situations relating to the COVID-19 pandemic have impacted the business and has also impacted the work of auditors. The current situations challenge the conventional
According to the statistics 73.2% of the most popular WordPress installations are vulnerable till date. These can be identified using automated tools and can be exploited.
Blockchain is an emerging technology that is quite popular nowadays due to the popularity of cryptocurrency. The blockchain contains a list of records or blocks which are linked using
Malvertisements are a malicious advertisement distributed in the same was as a legitimate online advertisement. It is one of the common practices to use spread malware.
CyRAACS is a great place to work because every day provides an opportunity to learn something new, to mentor and to be mentored to achieve our client’s goals.