Hero Image Hero Image

信息技術及網絡安全

最新文章

搜尋
過濾器
篩選條件
找到 14 結果s
The Dior Data Breach: A Trillion-Dollar Wake-Up Call for Global Cybersecurity

信息技術及網絡安全

The Dior Data Breach: A Trillion-Dollar Wake-Up Call for Global Cybersecurity

資料外洩是重塑全球網路安全的萬億美元威脅。我們最新的文章探討了 Dior 在 5 月 7 日 2...

Next Level Phishing: Deepfake Scam

信息技術及網絡安全

Next Level Phishing: Deepfake Scam

In the first half of 2024, the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) handled countless...

Requirements on Documentation Submission on GL20 Assessment

信息技術及網絡安全

Requirements on Documentation Submission on GL20 Assessment

最新的保險業監督網路安全指引概述了提交文件的三項主要要求...

AI: Model Personal Data Protection Framework

信息技術及網絡安全

AI: Model Personal Data Protection Framework

Did you know that over 70% of organisations have experienced a data breach involving AI technologies? With the evolution...

Hong Kong's New Critical Infrastructure Cybersecurity Law

信息技術及網絡安全

香港的新關鍵基礎設施網絡安全法

Hong Kong’s government has introduced the Protection of Critical Infrastructure (Computer System) Bill, a significant ...

Navigating the Cloud Security Landscape: Why CSA STAR is Essential for Trusted Cloud Transformation

信息技術及網絡安全

Navigating the Cloud Security Landscape: Why CSA STAR is Essential for Trusted Cloud Transformation

Cloud computing has become the backbone of modern business. Global businesses are confronted by pressing challenges arou...

The Importance of Data Privacy: Safeguarding Sensitive Information in the Digital Age

信息技術及網絡安全

The Importance of Data Privacy: Safeguarding Sensitive Information in the Digital Age

The digital age has ushered in an era of unprecedented data collection, storage, and processing, transforming how busine...

Prevent Financial and Reputational Loss with Effective Security Incident Management

信息技術及網絡安全

Prevent Financial and Reputational Loss with Effective Security Incident Management

The digital age has brought unprecedented convenience, but it has also given rise to a surge of new crimes. The anonymit...

Staying On Top For Potential Information Security Risk -  The Key Updates And Implications Of The Revised ISO27001

信息技術及網絡安全

Staying On Top For Potential Information Security Risk – The Key Updates And Implications Of The Revised ISO27001

In the past few years, the threat landscape had developed into a broader spectrum, reaching from classic attack patterns...

Protect Your Business From Cyber Threats – How Does  Penetration Testing Help?

信息技術及網絡安全

Protect Your Business From Cyber Threats – How Does Penetration Testing Help?

In recent years, data breaches have become more common and sophisticated, affecting organisations of all sizes and indus...