Twenty years ago this month, IBM made a significant decision to open up the mainframe by announcing it would support Linux.
Eight and four years into their existence, the Data Privacy Act and the National Privacy Commission respectively are at a crucial junction. If they are to remain relevant not just in the local regulatory ecosystem, but in the overall consciousness of Filipinos and residents alike, they have to confront difficult issues head on and with consistency.
Some steps that local SMEs can take to ensure that their business-critical information are kept secure even while implementing the WFH setup.
Given the evolving nature of cyber threats that are expected to become more sophisticated, it is also important that financial institutions have the necessary tools that can help track threats that can evade regular endpoint solutions, even before they hit you.
Retailers should embrace technology to sustain traditional operating principles and build a smarter operation that optimizes inventory and elevates the customer experience in today’s on-demand economy.
“Today is a very different reality from the yesterday we once lived, and tomorrow is filled with challenges and uncertainties. There is very little we can take control of at this point, but we can control how we react to the situation.”
In this brave new world of cybersecurity, can the enterprise remain one step ahead of cybercriminals?
Jam Jacob: “For public interest to justify the disclosure of prison records, a specific ground must still be identified. However, there are sufficient grounds under the Data Privacy Act that allow the sharing or disclosure of such records.”