Readying for that AI-led cyberattack
Former cybersecurity consultant, now freelance writer and author, John Meah, wrote on Techopedia that besides the potential benefits of artificial ...
Former cybersecurity consultant, now freelance writer and author, John Meah, wrote on Techopedia that besides the potential benefits of artificial ...
A human firewall, employees who adhere to the best cybersecurity procedures, is core to protecting a company from cyber threats, as they act ...
At the end-of-year holiday season, with major sales events and digital events, we’ll start to see a higher frequency of ...
Organisations in Singapore are facing imminent cybersecurity challenges as a result of rising threats and outdated cybersecurity programs, according to new research from Armis. Majority ...
In what may well be the norm, the Netskope Threat Labs Report, released in October 2023, claimed that Australia leads ...
Sophos released new findings into the connections between the most prominent ransomware groups in its report, “Clustering Attacker Behavior Reveals ...
Only 18% of Hong Kongers feel they are well-equipped to deal with cyber threats, even though 40% say scams and ...
A new report by Sygnia uncovered that attacks led by the Night Sky and Cheerscrypt ransomware groups originated from the same ...
Netskope launches SkopeAI which has capabilities that use AI/ML to deliver modern data protection and cyber threat defense. SkopeAI protects ...
Sophos is already working to incorporate some of the prototypes into its products.
There is no question today that ransomware is one of the biggest concerns for organisations as they struggle to ward ...
The 2022 Singapore User Risk Report found that only 44% of respondents can identify fraudulent calls. This makes the use ...
Most boards now regard cybersecurity as a business risk rather than solely a technical IT problem, according to a recent ...
Enterprises are accelerating their adoption of digitalisation and agile methodologies, dramatically changing their risk profiles. According to Gartner, many organisations ...
Backdrop: Proofpoint’s The Human Factor 2022 report reveals that more than 20 million messages attempted to deliver malware linked to ...
Turnkey cyber range programme closes the cybersecurity workforce gap With cybercrime on the rise and the scarcity of cybersecurity professionals, ...
Push button function acts as first response alert for any security breach ExtraHop, a cloud-native network intelligence company recently announced ...
In the new world of work, employees can afford to have more choice over their prospective job environment and are ...
Perennial use of legacy medical technologies that do not support security updates leaves the healthcare industry vulnerable to data breaches. ...
2021 looks to be the banner year of cybersecurity attacks as organisations continue their remote ways of working. Moving into ...
An air-gapped network is one that is physically isolated from any other network to increase its security. This technique can ...
Cybersecurity firm IntSights has released its latest research white paper ‘Selling breaches: The Transfer of Enterprise Network Access on Criminal ...
The good news is that security and risk management has become a board-level issue for organisations. In hindsight, this is ...
As National Cybersecurity Month ends, we are reminded of the opportunity to educate businesses on the most effective ways of ...
The volume of data organizations collect is rarely matched by their ability to manage it. This data boom, combined with ...
Into the final quarter of 2021 and we continue to read of cyberattacks against nations, enterprises and individuals. The State ...
If today, organizations are struggling to secure on-premises, private clouds or public clouds as separate infrastructure setups, what more will ...
Check Point Research (CPR) raises some concerns particularly about how one app, Voila, because it includes specific and unique installation ...
ABI Research says the success of the Colonial Pipeline ransomware attack exposed wilful ignorance to take cybersecurity seriously
Failure on the part of CSPs to keep up with the threats will trickle down to their customers, which will ...
“Having good tools in place so you can see every connection going out of the network and every user that ...
The new MAS guidelines call for the implementation of a robust process for the timely analysis and sharing of cyber ...
COVID-19 sees 4-digit increase in digital threats masked as e-learning platforms in Southeast Asia. Education has become a new target
"Predicting the future is always difficult but the foreseeable future will have plenty of work. I think the world needs ...
52% of businesses surveyed report loss of customer trust is the top consequence that would result from a breach and ...
FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl