Are You Protecting Your Banking Customers from Mobile Threats?

Man using a mobile phone

Information security is an exciting industry, and the stakes couldn’t be any higher than they are in the financial industry. As CISO of a software company that serves some of the biggest banks in the world, I am constantly coming face to face with new security challenges. The internet has brought immense opportunities for customer … Read more

Competing Rules—Do GDPR and PSD2 Work Together or Against Each Other?

Small silver lock on a mac keyboard

Were you perplexed by the recent bombardment of emails concerning privacy policies? Since you’re reading this, you likely know that it was due to the European Union’s General Data Protection Regulation (GDPR) going into effect on 25 May of this year. Its purpose is to protect data subjects’ control of and access to their personal … Read more

International Data Privacy: Out in Front in the Outback

Outback data privacy chain link fence

This is the last in a series examining data privacy and the international data security regulatory environment. For the first installment, click here. For the second installment, click here. The European Union General Data Protection Regulation (GDPR) of 2016 was the focus of my last post because of its wide-ranging approach to protecting sensitive data. … Read more

Liberty, Privacy, Data Security: Learning from Europe

Data security hacker in a black hood

This is the second in a series of three blog posts by Katabat’s Chief Information Security Officer, Arthur Haigh, examining the international data security regulatory environment. Read the other installments here and here.   Part of being a leader in information security is realizing that you aren’t going to prevent every attack. CISOs and CSOs advocate tirelessly for … Read more

Data Privacy in the Age of Big Hacks

Padlock Data Security

This is the first in a series of three blog posts by Katabat’s Chief Information Security Officer, Arthur Haigh, examining the international data security regulatory environment. To read the other posts in this series, click here and here. Do the words “data breach” make you flinch? Not unusual, these days. If you’re having nightmares about breaches, … Read more

We use cookies on this site to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies.