
Strengthening the security of supply chains
A recent study revealed that more than half (56%) of organisations in Hong Kong admitted being unable to detect or stop supply chain

A recent study revealed that more than half (56%) of organisations in Hong Kong admitted being unable to detect or stop supply chain

Since the adoption of robotic process automation, there is this subtle expectation that automation is the future for many things

Almost half of all account takeover attacks targeted Application Programming Interface (API) endpoints, according to Imperva’s The State of API Security in 2024. As

Five years since Secure Access Service Edge (SASE) was introduced, around 72% of security professionals consider end-user experience the most important to

CyberArk affirms its support for the identity security threat landscape in Hong Kong amidst the growing number of identity-led cybersecurity threats. According

Group-IB discovered a new information stealer malware targeting users in Vietnam by automatically filtering out Facebook session cookies and credentials

Check Point® Software Technologies Ltd. launched the Check Point Quantum Force series, which includes ten firewalls designed to strengthen the security of enterprise

Vectra AI, Inc. launched Vectra MXDR (Managed Extended Detection and Response) services, the industry-first, global, 24×7 open MXDR service built to defend

Kyndryl and Veeam® Software announced a global strategic alliance focused on providing customers with cyber resiliency services for improved business continuity, reduced costs, and increased

Artificial Intelligence (AI) transforms the fight against cyber threats by playing a pivotal role in collecting, processing, and neutralising risks, says GlobalData. “The ability

A global survey of over 1,917 IT security practitioners revealed the behaviour and proven security measures implemented by ’High Performers’

Group-IB uncovered a new iOS Trojan named GoldPickaxe.iOS that intercepts SMS and steals users’ facial recognition data and identity documents. Group-IB’s Threat Intelligence discovered that