Cyber Strategy

Why Data Protection Laws Exist And What They Govern

In this article, we explore a brief history behind data protection laws such as the GDPR, PDPA, and CCPA, including the purpose of these laws and how they are enforced today.

Yang JianGangFeb 07, 2020

Explore:

Featured List

Cyber Threats

Understanding Different Types of Ransomware to Reduce An Attacker’s Leverage

Loh Soon BockJan 10, 2020
Events

From Strength To Strength: A Horangi Journey In Indonesia

Paul HadjyJan 17, 2020
Events

Ask A CISO Ep. 03: An Interview With George Do, Gojek CISO

Paul HadjyNov 21, 2019
Cyber Threats

The Biggest Questions About Ransomware Answered

Mark Anthony FuentesDec 13, 2019
Events

Inside Horangi's First ASEAN FinTech Security & Compliance Snapshot

Lance ChuaNov 29, 2019
Cyber Threats

A Brief History of Ransomware

Mark Anthony FuentesSep 27, 2019
Release Notes

August–September 2019 Release Notes: Vulnerability Management Beta

Samantha CruzSep 24, 2019
Cyber Strategy

Does Pentesting Make Sense For Small Businesses?

Johnson ThiangAug 26, 2019
Cyber Threats

Why Do Hackers Hack?

Johnson ThiangOct 07, 2019
Cyber Strategy

As Third Party API Usage Grows, So Do API Data Breaches

Paul HadjyJul 26, 2019

Subscribe to the Horangi Newsletter.

Hear from our Horangi tech experts as we go deep into up-and-coming cyber threats, new solutions, and talk about the future of cybersecurity.

Search

Latest Stories:

All Categories

Commentary

Building An Effective Cybersecurity Team In A Workforce Deficit

Mark Anthony FuentesFeb 21, 2020
Cyber Strategy

The 6 Essential Things Every Data Protection Officer Needs To Be Effective (Pt. 02)

Yang JianGangFeb 14, 2020
Cyber Strategy

Why Data Protection Laws Exist And What They Govern

Yang JianGangFeb 07, 2020
Release Notes

Warden January 2020 Release Notes: New Compliance Standards Supported

Samantha CruzJan 31, 2020
Press

Horangi CEO & Co-Founder Paul Hadjy Featured On ScaleUp Valley Podcast

Paul HadjyJan 24, 2020
Events

From Strength To Strength: A Horangi Journey In Indonesia

Paul HadjyJan 17, 2020
Cyber Threats

Understanding Different Types of Ransomware to Reduce An Attacker’s Leverage

Loh Soon BockJan 10, 2020
Events

A Look At 2019 As We Step Into The New Year

Paul HadjyJan 03, 2020
Cyber Threats

Ask A CISO Ep. 04: Hard Truths In Cloud Security

Steve TeoDec 20, 2019
Cyber Threats

The Biggest Questions About Ransomware Answered

Mark Anthony FuentesDec 13, 2019