Living with shareholder agreements

The boardroom battle at United Spirits raises questions over related party transactions, legal sanctity of a shareholder agreement, rights of minority shareholders and corporate governance practices Read more »

Related-party transactions: A case of regulatory dissonance?

One of the most debated aspects of the Companies Act, 2013, has been the introduction of a revised regime pertaining to related party transactions. To introduce transparency and fairness, the law has... Read more »

Criticisms of proposed GST are mostly wrong

All GSTs in federal countries all over the world are imperfect Read more »

Excise duty at point of sale: SC

A weekly selection of key court orders Read more »

Insurers unable to adequately answer consumer questions online

Eptica research finds multichannel customer service not improving within insurance sectorReading, 30 April 2015, UK insurers are failing to deliver multichannel customer service to customers and prospects, answering just 40% of routine... Read more »

You’re biased and it’s costing you money

When you’re driving on the highway and a car cuts in front of you, most people will assume (and loudly exclaim) that the other driver is a “jerk” (or some slightly ruder... Read more »

Threat Intelligence: Standards Required

To deliver effective information sharing and threat intelligence, the security industry must settle on a single set of threat-sharing standards, says David Duncan of the Internet security firm Webroot. Read more »

Helping Cybercrime Takedowns

Malware researchers can track important technical details about attacks, but shutting down cybercrime networks requires law enforcement agencies to take the next step, says Alexander Erofeev of Kaspersky Lab. Read more »

Malaysia’s Cybersecurity Agenda

Malaysia's cybersecurity chief believes awareness is vital to establish security readiness to stay ahead of threats. Dr. Wahab's agenda includes developing security centers of excellence to fight threats. Read more »

Securing the Corporate Brand

Rogue applications designed to impersonate a company's corporate brand are increasingly prevalent, offering attackers an easy way to fool online users into downloading malicious apps aimed at compromising credentials, says Arian Evans... Read more »