Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Top 10 Use Cases of Vibe Coding in Large-Scale Node.js Applications

      September 3, 2025

      Building smarter interactions with MCP elicitation: From clunky tool calls to seamless user experiences

      September 4, 2025

      From Zero to MCP: Simplifying AI Integrations with xmcp

      September 4, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025

      Coded Smorgasbord: Basically, a Smorgasbord

      September 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025
      Recent

      Drupal 11’s AI Features: What They Actually Mean for Your Team

      September 5, 2025

      Why Data Governance Matters More Than Ever in 2025?

      September 5, 2025

      Perficient Included in the IDC Market Glance for Digital Business Professional Services, 3Q25

      September 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025
      Recent

      How DevOps Teams Are Redefining Reliability with NixOS and OSTree-Powered Linux

      September 5, 2025

      Distribution Release: Linux Mint 22.2

      September 4, 2025

      ‘Cronos: The New Dawn’ was by far my favorite experience at Gamescom 2025 — Bloober might have cooked an Xbox / PC horror masterpiece

      September 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Australia Tightens Data Privacy Laws – Till Payments’ Madhuri Nandi Explains What’s Next

    Australia Tightens Data Privacy Laws – Till Payments’ Madhuri Nandi Explains What’s Next

    June 5, 2025

    Madhuri Nandi

    As data breaches rise and public trust flickers, Australia has taken a bold step in reforming its Privacy Act, marking one of the significant regulatory shifts in the region’s digital history. To decode what this means for businesses, The Cyber Express sat down with Madhuri Nandi, Head of Security at Till Payments, Australia. 

    With nearly 20 years in cybersecurity leadership, Nandi brings a sharp perspective on how these changes impact legal, IT, and security teams alike. 

    Madhuri Nandi Explains the Expanded Definition of Personal Data 

    In the interview, Nandi highlights that the sheer scale of recent breaches in Australia triggered the Privacy Act overhaul, pointing to the outdated nature of the previous regulations. She explains that the definition of personal data has now broadened to include behavioral and inferred data, increasing accountability for companies collecting and processing user information. 

    “You’re not playing the small game anymore. If you don’t handle data properly, you’re looking at penalties as high as $50 million or 30% of your turnover,” she warns. 

    Nandi also notes a cultural shift: where once privacy was a checkbox exercise, now legal and cybersecurity teams are collaborating from the start of the product lifecycle.  

    On the broader opportunity, she adds, “Businesses that respect data today are the ones who will win customer trust and competitive edge tomorrow.” 

    The conversation also touches on the role of AI and personal data risks, as well as the strengthened powers of the Office of the Australian Information Commissioner (OAIC) to audit organizations without formal complaints. 

    Watch the Full Interview: 

    To dive deeper into Madhuri Nandi’s expert insights on regulatory trends, privacy-first leadership, and cybersecurity best practices in Australia,

    Click here to watch the full interview on YouTube 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleIran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware
    Next Article DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

    Related Posts

    Development

    How to Fine-Tune Large Language Models

    September 5, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 5, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-41234 – VMware Spring Framework Reflected File Download Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Battlefield 6 is the official title, and its reveal trailer has a release date this week — is my favorite multiplayer FPS about to make a massive comeback?

    News & Updates

    Google Proposes New Browser Security: Your Local Network, Your Permission!

    Security

    Denodo Scheduler Vulnerability Let Attackers Execute Remote Code

    Security

    Highlights

    News & Updates

    I’ve been trying to figure out why these AR glasses cost $700, but I’m frankly stumped

    April 26, 2025

    The ASUS AirVision M1 AR glasses are functional and complete, but are wildly overpriced and…

    Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 30/2025

    July 27, 2025

    Critical Chrome Flaw CVE‑2025‑9132 Exposes Browsers to Remote Code Execution

    August 20, 2025

    Pixyne is a tool to fix your photos

    May 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.