
Misconfigurations are the main culprit in cloud security
Trend Micro urges that cybersecurity be considered at all stages of cloud migration as it cites misconfigurations as a top

Trend Micro urges that cybersecurity be considered at all stages of cloud migration as it cites misconfigurations as a top

FSIs that do not implement best practices may find themselves specially targeted by cyber threat actors looking to exploit weak

There is always a struggle in development cycles to make sure you are ahead of the competition and unfortunately sometimes

This TIBCO whitepaper outlines how the API landscape reached its current state, where things are going, and how things will

Singapore’s OT Masterplan has outlined three key pillars to focus their cybersecurity efforts on – people, process, and technology, as

Communications has been one of the focal areas of interest since 2019 as consumers, enterprises, governments and the telecom industry

IT must interpret what product marketing is telling them and bring together technologies, including applications, to enable the creation of

FutureCIO spoke to Subroto Panda, chief information officer of India-based law firm Anand & Anand to get his perspective about

Known vulnerabilities remain key to successful cyberattacks, including ransomware. In 2019, crybercriminals continue to favour emails, ransomware and phishing

There is the view that hackers are malicious and intending to harm businesses although companies have started to embrace bug

Gartner says traditional risk management practices are effective during COVID-19. Dynamic Risk Governance is significantly more effective.

According to the European Centre for Disease Prevention and Control 378,041 cases of COVID-19 have been reported since 31 December