infosec law

Home/Tag:infosec law

Corporate AI deepfake fraud: When trusted faces deceive

It's time to address corporate artificial intelligence (AI) deepfake fraud. AI can now create compelling fake videos and audio of real people. This 'deepfake' technology presents a growing threat to businesses, particularly through financial fraud. Criminals are using deepfakes to [...]

By |2025-04-10T10:44:20+02:00April 10th, 2025|Categories: AI Law, Cybersecurity Law|Tags: , , , |

Executive cyber liability risks

Time to talk about executive cyber liability risks. Managing cybersecurity and compliance at a senior level carries more significant personal risks than ever. Regulators worldwide are increasingly holding individual executives, such as Chief Information Security Officers (CISOs) and Chief Compliance [...]

By |2025-03-27T16:00:19+02:00March 27th, 2025|Categories: Cybersecurity Law|Tags: |

Cybersecurity law compliance: Getting it ‘just right’

Like Goldilocks sampling porridge, businesses face the challenge of getting their cybersecurity measures 'just right' — not too weak to invite breaches nor too cumbersome to stifle operations. In today's landscape, fraught with AI-driven scams and rampant ransomware attacks, achieving [...]

By |2025-03-27T16:17:39+02:00March 20th, 2025|Categories: Cybersecurity Law|Tags: |

Implementing the cybersecurity triad

Implementing the cybersecurity triad effectively is like managing traffic at a busy intersection. 'Confidentiality', 'Integrity', and 'Availability' each represent a different stream of traffic. If one stream isn't managed correctly, it disrupts everything, causing chaos and risks to security. Cyber [...]

By |2025-03-18T19:10:59+02:00March 18th, 2025|Categories: Cybersecurity Law|Tags: |

AI voice cloning scams

Artificial intelligence (AI) brings convenience to our lives, but imagine your voice being stolen and used as a weapon by criminals. AI voice cloning scams use your voice, or that of someone you trust, to deceive you into transferring money [...]

By |2025-03-18T13:54:08+02:00March 17th, 2025|Categories: AI Law, Cybersecurity Law|Tags: , , , |

Enterprise security policy development

Cybersecurity is a necessity for all organisations today, not a luxury. Modern businesses face complex and evolving threats targeting their data, networks, and systems. Even one vulnerability can result in severe breaches, financial loss, and damage to reputation. Just as [...]

By |2024-09-12T17:35:20+02:00September 12th, 2024|Categories: Cybersecurity Law|Tags: |

Cybersecurity risks in the two-pot retirement system

Picture your retirement savings as a fortress: one side built up over the years, while a new door suddenly appears, unlocked. This is South Africa's two-pot retirement system, launched on 1 September 2024, giving people early access to their retirement [...]

By |2024-09-11T10:34:17+02:00September 11th, 2024|Categories: Cybersecurity Law|Tags: , , |

Information security incident reports

Navigating the stormy seas of information security requires more than just a robust ship; it also demands a vigilant crew equipped with precise navigation tools. Information security incident reports are essential tools in the world of data protection. This document [...]

By |2024-08-13T18:00:45+02:00August 13th, 2024|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |

Cybersecurity due diligence

Cybersecurity acts like a watchtower in our connected world, vigilantly spotting potential threats. As businesses link more closely, protecting their supply chains from cyber attacks becomes increasingly vital. This article focuses on the essential role of Service Level Agreements (SLAs) [...]

By |2025-03-20T13:24:45+02:00July 2nd, 2024|Categories: Cybersecurity Law|Tags: |

Access control policy development

An access control policy is a permission slip for an organisation's crucial assets, such as data and systems. It specifies who can access particular resources, ensuring the security of operations and adherence to standards like ISO 27001. Essential elements of [...]

By |2024-04-23T13:47:01+02:00April 23rd, 2024|Categories: Cybersecurity Law|Tags: |

CISO cybersecurity liability in the US

For CISOs looking to avoid cybersecurity liability, managing cybersecurity can feel like tensely moving blocks in a tower and hoping it doesn't fall over. Each move by Chief Information Security Officers (CISOs) must ensure their company's digital safety without inviting [...]

By |2024-03-27T00:29:37+02:00March 27th, 2024|Categories: Cybersecurity Law, POPI and Data Protection|Tags: , , , , |