Philhealth bounces back after Medusa ransomware attack
The website and members portal of the Philippine Health Insurance Corporation (PhilHealth) were restored following the hacking of its database due to ...
The website and members portal of the Philippine Health Insurance Corporation (PhilHealth) were restored following the hacking of its database due to ...
The healthcare industry was the most targeted industry sector by ransomware last year, according to a study released by Arcserve. ...
Workday, Inc.’s latest global study reveals the optimism of leaders about the potential impact of artificial intelligence (AI) and machine learning (ML) ...
Recorded Future revealed that 18 out of the approximately 2,400 newly disclosed vulnerabilities in August 2023 were high-risk. Two of ...
HGC Global Communications Limited (HGC) announced the launch of a one-stop secure access service edge (SASE)-managed service for companies operating ...
Around 85% of organizations suffered from at least one ransomware attack in the past 12 months, according to Veeam’s 2023 Global ...
ExtraHop open-sourced one of the most robust machine learning datasets to help strengthen defenses against malware, botnets, and domains generated by algorithms (DGAs). Collaboration against ...
Kaspersky experts identified a malicious campaign targeting Linux systems, where victims’ devices are compromised using an infected version of Free ...
Cybersecurity teams can utilise Artificial Intelligence (AI) to upgrade defenses against cyber attacks in the Asia Pacific (APAC), especially that ...
With any data, we need to ensure measures are in place to secure the data at each stage of its ...
Sophos released new findings into the connections between the most prominent ransomware groups in its report, “Clustering Attacker Behavior Reveals ...
I’m thrilled to announce our latest research into a problem as old as time (or, at least, my time — ...
We can think of generative AI as behaving like antibiotics: wonder drugs at their debut that became increasingly problematic over ...
Most organisations are optimistic about AI but adopting it requires trainings and awareness on privacy and security according to Global ...
Technavio reports that the Artificial Intelligence (AI) Text Generator Market size is set to grow by USD 582.34 million at a 17.22% CAGR ...
Only 18% of Hong Kongers feel they are well-equipped to deal with cyber threats, even though 40% say scams and ...
Gartner says the mass availability of generative AI has become a top concern for enterprise risk executives in the second ...
96 percent of people use technology to relax, according to the latest survey performed by Cint and commissioned by cybersecurity company ...
Organisations can now purchase a private version of the ChatGPT and no longer risk leakage of private or sensitive data ...
The latest IBM Data Breach Report revealed that an alarming 83% of organizations experienced more than one data breach during 2022. According ...
The global market for Digital Health estimated at US$216.5 Billion in the year 2022, is projected to reach US$857.2 Billion by 2030, growing ...
Ransomware was in the headlines worldwide last year as cyberattacks hit a broad swathe of businesses and organisations, maliciously causing ...
A mass-spreading phishing campaign aimed at collecting Zimbra account users’ credentials was detected by ESET researchers. The ongoing campaign has ...
CyberArk launched its unified CyberArk Identity Security Platform to better protect Indonesian organisations from growing attacks on human and non-human. ...
The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber ...
SINGAPORE. More than half of Singapore’s local and foreign member banks are lagging behind on basic cybersecurity measures, according to ...
(ISC)² , the world’s largest non-profit association of certified cybersecurity professionals, announced over 265,000 enrolments and more than 27,000 individuals achieving ...
SEAN organisations with extensive use of security AI and automation cut breach lifecycles by 99 days and reduce data breach ...
Worldwide spending on security solutions and services is forecast to be US$219 billion in 2023, an increase of 12.1% compared ...
Cybersecurity is often not a tool but a people problem. Most IT and security teams are generally overworked, understaffed and ...
Kissflow's new governance layer addresses the need for data protection, compliance, and visibility in the growing adoption of low-code and ...
Despite the growing use of backups, manufacturing and production reported longer recovery times this year.
Network operations teams are struggling with the rapid change in the cloud and dynamic resource orchestration, rendering older technology inadequate ...
Gartner predicts that by 2026, 70% of boards will include one member with cybersecurity expertise. In the meantime, however, CISOs ...
Cisco announced the launch of a new Full Stack Observability (FSO) Platform—a vendor-agnostic solution that harnesses the power of the ...
IDC defines the endpoint security software market as products designed to protect physical and virtual endpoints, such as personal computing ...
In the wrong hands, this data is enough to jump-start a cyberattack that could lead to a data breach, placing ...
Forrester's Top Cybersecurity Threats in 2023 lists among other things the potential to weaponize artificial intelligence variants like Generative AI ...
Cisco's latest Cybersecurity Readiness Index says globally only 15% have a mature level of preparedness to handle security risks. The ...
The survey found that a large volume of threat alerts, alarms, tickets, and possible incidents generated by various security tools ...
Conversational threat actors could soon be using AI as a full-stack criminal accomplice, creating all the assets they need to ...
IBM and Cisco unveiled their new cloud-based TDR solutions aimed at helping SOC teams to protect expanding digital footprint.
npm package provenance will help developers verifiably link npm packages to their source repository and build instructions
The combination is designed to make it easy for enterprises to secure their API's by helping them discover all of ...
Image by Elias from Pixabay
Gartner says the endlessly expanding digital footprint of modern organisations is introducing new security challenges. The pandemic response has accelerated ...
Gartner predicts that by 2025, 60% of supply chain organisations will use cybersecurity risk as a significant determinant in conducting ...
A Gartner survey reveals that 50% of chief information security officers (CISOs) will adopt the human-centric design to reduce cybersecurity ...
Sophos is already working to incorporate some of the prototypes into its products.
In 2020, threat actors focused their efforts on Covid-19-related threats, ranging from email threats, and business email compromise, to social ...
Spending a lot on cybersecurity does not mean great protection. Believing otherwise leads to big security budgets and disappointed executives. ...
The report finds that much of the increase in DDoS attacks is driven by groups that have taken sides in ...
Built on the Okta Workforce Identity Cloud, it works seamlessly with out-of-the-box integrations to more than 400 applications
ZTE's product security governance and 5G NR product have complied with the stringent security requirements of Germany.
BlackBerry explores the pernicious threats targeting macOS, including malicious codes that are sometimes even explicitly downloaded by users.
Among the many crises and challenges facing the world, cybersecurity remains the top near-term risk for banks around the world. ...
Besides the disconnect between customers’ expectation and companies’ privacy strategy, the survey also finds that organisations privacy priorities differ from ...
The new platform combines complete data protection, Sophos cybersecurity protection, immutable storage, tape backup and scalable onsite or offsite business ...
Following the release of a survey by the World Economic Forum on 18 January 2023 showing that businesses feel a ...
According to Forrester, in 2022 organisations saw the extent to which systemic risks, including climate change, supply chain, and political ...
There is no question today that ransomware is one of the biggest concerns for organisations as they struggle to ward ...
Asia has been a tech-forward region and businesses are still hungry for transformation to gain an edge. While 2023 looks ...
“The State of the Security Team 2022: Can Security Teams Meet Stakeholders’ Requirements? reveals a significant improvement in leadership teams’ ...
According to Check Point Research, global attacks increased by 28%in the third quarter of 2022 compared to the same period ...
This growing threat has already affected five million people globally, with hackers selling webcam snaps, screenshots, up-to-date logins, cookies, and ...
The use of unregistered devices is adding a new layer of challenge for security professionals as they tackle complexities in ...
In the newly published 2022 State of Digital Trust Survey, results also show that 88% of customers in the region ...
The 2021 ISACA-Frost & Sullivan Survey: The Singapore Cybersecurity Landscape, revealed that 63% of respondent organisations were adopting the cloud ...
Most boards now regard cybersecurity as a business risk rather than solely a technical IT problem, according to a recent ...
Approximately 80% of organisations plan to consolidate cybersecurity solutions under one vendor over the next three years, according to Microsoft ...
Manufacturing and production companies reported the lowest level of backup use across all sectors, with just 58% of respondents using ...
As organisations in Southeast Asia embrace a digital-first mindset, cybersecurity remains a high-priority investment area for the majority of the ...
2022 (ISC)² Cybersecurity Workforce Study sheds light on the demand for cybersecurity talent in APAC with a 52.4% year-over-year surge.
Through the Cybersecurity Experience Lab, enterprises can experience different kinds of simulated cyberattacks.
Cyber security has emerged as a top priority for organizations and consumers alike, especially following the spread of the COVID-19 ...
While cybersecurity is dominant on boardroom agendas, there seems to be a disconnect between board members and their CISOs. According ...
Ninety percent of cybersecurity professionals polled in Singapore say that their organisation has a siloed security model, according to the ...
The InfoSec Institute estimates there is a worldwide staffing shortage of nearly three million in the ranks of cybersecurity professionals, ...
Check Point Horizon brings a prevention-first approach to security operations by providing SOC teams with the tools and services needed ...
With its new NGFW solution, the school’s small IT team gained a security tool not only delivers advanced visibility but ...
Devastating cyberattacks causing widespread damage to critical infrastructure and disrupting citizens’ lives are no longer the stuff of Hollywood movies. ...
Survey results revealed 49% of companies plan to take a more proactive stance in protecting their digital assets in the ...
The new security products allow companies to view their organisation as an attacker would.
Just as how other industries have adopted the 'as-a-service model', illicit service providers have done the same by selling tools, ...
Risk mitigation strategies all security engineers should know Enterprises that rely on dated software vendor patching models still find themselves ...
Strong encryption is critical to protecting sensitive business and personal data. Google estimates that 95% of its internet traffic uses ...
The ongoing complexity of IT systems, along with evolving regulations are the major challenges faced by IT security professionals. IDC ...
Turnkey cyber range programme closes the cybersecurity workforce gap With cybercrime on the rise and the scarcity of cybersecurity professionals, ...
Push button function acts as first response alert for any security breach ExtraHop, a cloud-native network intelligence company recently announced ...
Cybersecurity commissioner stresses the importance of teamwork at (ISC)² Conference In cultivating talents in the field of cyber security (ISC)², ...
Fortinet recently released its 2022 Cybersecurity Skills Gap Report to underline some of the IT talent concerns, challenges and repercussions ...
In a report released recently by Snyk and Linux Foundation, there are more vulnerabilities that developers admit to be exposed ...
Increase in cyber threats face today's organisations A recent study from A10 Networks with 250 corporate organisations revealed key challenges ...
In light of today’s rising ransomware attacks, organisations no longer need to worry about completely losing their mission critical data ...
During the opening keynote at the Gartner Security & Risk Management Summit in Sydney Gartner senior director analyst, Richard Addiscott ...
As we near the halfway point of 2022, enterprises around the world are preoccupied with cybercrime. Its spectre trumps concerns ...
Companies today face an expanded cybersecurity footprint as the ongoing pandemic requires more applications to be moved to the cloud. ...
The ExtraHop 2022 Cyber Confidence Index—Asia Pacific, noted that 83% of organisations in Asia Pacific were breached by ransomware at ...
According to IDC’s Security and Trust Study 2022 69% of CEOs in Asia-Pacific (excluding Japan) are now engaged in cybersecurity ...
In cybersecurity parlance, dwell time is the time it takes between an attacker’s initial penetration of an organisation’s environment and ...
Peter Firstbrook Death and taxes are said to be life’s only two certainties. As organisations continue their digital transformation journey, ...
The Sophos report, Future of Cybersecurity in Asia Pacific and Japan, reveals a lack of boardroom awareness of cybersecurity, and ...
* Editor's note: This article is co-produced by Sukhpreet Kaur For years, information security has been floating in the Top 10 ...
Cybersecurity investment is broken Cybersecurity is now the #1 spend item on the technology investment list. In 2022, 88% of ...
The CISO is responsible for the vision, strategy, and program to ensure the protection of information assets, and technologies. As ...
One of the outcomes of the pandemic is the accelerated adoption of cloud computing. But whereas cloud was first thought ...
The role of cybersecurity leaders needs to evolve, as accountability for cyber risk shifts outside IT and an increasingly distributed ...
New research from KnowBe4 found that 59% of APAC office workers don’t believe using their work email for personal activity ...
As a common topic in Gartner inquiry, I thought it would be worth addressing some of the issues we are ...
The IBM Cost of a Data Breach Report 2021 noted that the average total cost of a data breach stood ...
Business sentiment continues to show strong recovery, with 2021 witnessing the highest gain in the past four years on account ...
Cloud adoption continues to accelerate in Singapore, with 63% of respondent organizations adopting cloud more during the pandemic. 29% of ...
2021 saw the sustained acceleration of innovation and digital transformation as organizations continued to navigate the effects of the global ...
The Singapore Cybersecurity Strategy 2021 announcement recognised the need for a ‘’zero-trust’’ mindset approach to protecting organisations from new technological ...
An air-gapped network is one that is physically isolated from any other network to increase its security. This technique can ...
Respondents to the Deloitte Global’s 2021 Future of Cyber Survey observed that the acceleration of digital transformation has also resulted ...
A global study of 1,200+ security professionals at organisations revealed a disconnect between the risk ransomware poses to organisations during ...
One of the outcomes of the pandemic has been the increase in cyberattacks riding on the mass work from home ...
Domain-based Message Authentication, Reporting & Conformance or DMARC is an email validation protocol designed to protect domain names from being ...
Everest Group reports that although a talent shortage exists across the overall engineering, research and development (ER&D) landscape, the supply ...
According to Omdia, the pandemic has changed technology priorities for organisations worldwide. But we know that already! The researcher noted ...
The State of Ransomware in Manufacturing and Production 2021 by Sophos revealed companies in this sector were the least likely ...
CIOs need to realise that data management involves not just technology, but people and processes. CIOs must focus on their ...
Over half of Asia-Pacific businesses are unsure if their cybersecurity defences are strong enough amid growing threat
The CISO’s top priority might not be fully aligned to the CIO, because some of the security initiatives or security ...
FutureCIO asked security architect Clement Lee, from Check Point Software Technologies, Siupan Chan, sales engineering manager with Sophos, and the ...
Cybersecurity skills in the channel are in high demand and hard to find. Canalys lists eight traits that can be ...
This report highlights the challenges and approaches security professionals to respond to the evolving requirements for a secure hybrid workplace.
To adapt to the risks of future cyber threats, and not only to survive the crisis, but businesses also need ...
To address the OT-IT security problem is to recognise the problem at the onset: there is a wall dividing IT ...
Gartner warns that the objective may harm or kill humans and suggests implementing a security control framework
Results indicate cyber-related information sharing is increasing, signalling a positive response to national- and industry-level calls to action
Cybercriminals are now turning to data theft as a primary objective to ensure their ransom demands are met, otherwise, they ...
To boost cybersecurity posture, we need to look at cyber resiliency, which involves not just the technical aspect of it ...
The way passwords are implemented and used today presents a challenge to making integrity, security, and usability possible.
Critical infrastructure organizations, like airports, remain far behind where they should be in their cyber maturity and digital resilience strategies.
With zero trust we are now able to apply context to security decision-making processes that we’ve not been able to ...
Enterprises are coming to realise that cyber threat defence and mitigation against increasingly sophisticated attacks are becoming ever harder to ...
This 2020 Remote Work from Home Report, sponsored by Ivanti and produced by Cybersecurity Insiders, offers an in-depth perspective on ...
ABI Research says the success of the Colonial Pipeline ransomware attack exposed wilful ignorance to take cybersecurity seriously
Protect without compromising the user experience. Bitglass CTO, Anurag Kahol identifies 4 challenges with corresponding solutions
The growing popularity of hybrid and multi-cloud strategies should be raising warning flags to businesses that must mandate securing this ...
2020 revealed shortcomings in security strategies with the majority are still buying point solutions to address specific concerns.
The private sector is expected to propel cybersecurity solution adoption amidst increasing awareness among policymakers and a growing number of ...
Cyberattacks increase while stagnant budgets and apathetic leadership remain major cybersecurity barriers across Asia-Pacific. Skills issues also remain an issue.
A good cybersecurity program should complement all relevant laws and regulations that are geared towards improved cybersecurity practices.
Gartner says advanced technologies enable stronger protection and quicker detection of and response to incidents. But there is a caveat.
“Having good tools in place so you can see every connection going out of the network and every user that ...
In this PodChat for FutureCIO, Daniel Chu of ExtraHop talks about the three most common security mistakes CIOs make as ...
MyDIGITAL is critical to advance Malaysia and the key is in its execution. Blueprint includes greater use of cloud, 5G ...
Kaspersky experts share tips to help employers and businesses stay on top of any potential IT security issues and remain ...
CIOs and CISOs draw up a clear strategy of what they want and need to do for their organisations. They ...
As more OT is being brought into more IT environments, it is being linked to more IT infrastructure –becoming a ...
DDLS CEO Jon Lang experts offer their predictions for developments in information technology, cybersecurity, and project management.
Gartner predicts 40% of boards will have a dedicated cybersecurity committee by 2025 to better manage the cyber risk.
Growing concerns about effective data security and privacy in quantum computing fuels quantum cryptography, allowing businesses to encrypt data quickly ...
SETI@home was launched on May 17, 1999, to help search for extra-terrestrial – that’s right: ET – by using the ...
There's been a really big shift in needing to consider those kinds of commodity malware infections as just the beginning ...
Group-IB's Dmitry Volkov advocates that cybersecurity be in the hands of those of provide users with services and process their ...
CYFIRMA CEO Ritesh Kumar gives his take on the cybersecurity threat landscape in Asia in 2021 and some tips to ...
Cloud adoption is building a strong case for network data as a central tenet of security. NDR enables comprehensive visibility ...
Frost & Sullivan sees retail, banking and tech sectors fuelling demand for holistic web protection market, forecasts US$3.63 billion by ...
This Sophos 2020 paper offers guidance on what enterprises can do to fortify their cybersecurity strategies through a better understanding ...
This IBM white paper guides you towards an integrated cybersecurity platform – one that is effective today as well as ...
Palo Alto Networks' Sean Duca offers 4 identifiable cybersecurity trends that he claims will influence 2021 starting with increased debate ...
Four SolarWinds tech geeks predict the technology trends to expect in 2021. Some of the predictions are already here in ...
A joint ISACA-Frost & Sullivan survey provides an update on Singapore's cybersecurity position during the COVID-19, including drivers and concerns ...
2021 Audit Plan Hot Spots Report highlights how COVID-19 has dramatically accelerated digital risk
From supporting a remote workforce to delivering an optimal digital experience for the consumer, it is crucial that IT investments ...
If there are two words to describe the state of transformation in 2021, they are change and flexibility. Achieving these ...
Pierluigi Cau, director of Solutions Engineering APAC at GitHub, offers his take on the security as part of the development ...
It is the stuff that nightmares are made of – the kind that CISOs and CIOs have been sweating over ...
Women currently represent about 20% of people working in the field of cybersecurity, and the number of women in cybersecurity ...
Gartner predicts 75% of CEOs will be personally liable for cyber-physical security incidents by 2024
COVID-19 has greatly accelerated remote working, digital transformation and cloud adoption in Singapore. Now more than half have sufferd a ...
The chronic lack of cybersecurity expertise in an increasingly hostile threat environment has pushed enterprises to find ways to bridge ...
In the new post-pandemic world, it’s more important than ever for organisations to take cybersecurity seriously, to be on guard ...
Over half (53%) of businesses devote more than half their IT budget to cybersecurity, 50% of companies increasing cybersecurity budgets ...
Despite being more cybersecurity aware, SG remote workers still engage in risk behaviour online, revealed Trend Micro survey.
In this whitepaper, Beyond the Hype: AI in your SOC, IBM present’s 7 questions that you need to ask as ...
There is always a struggle in development cycles to make sure you are ahead of the competition and unfortunately sometimes ...
Singapore’s OT Masterplan has outlined three key pillars to focus their cybersecurity efforts on – people, process, and technology, as ...
FutureCIO spoke to Subroto Panda, chief information officer of India-based law firm Anand & Anand to get his perspective about ...
No organization, big or small, is immune from a devastating cyberattack. Cyber exploits are more sophisticated, elusive, and targeted than ...
The inherent vulnerabilities associated with healthcare devices, such as a lack of encryption of sensitive data as well as hard-coded ...
Talent shortage has created an active recruitment market, where 85% of senior cybersecurity professionals would consider a new role if ...
Security operations teams face challenges in understanding how their security tools work leading to data breaches, vulnerabilities and wasted time ...
When CISOs come to work each day, there is a growing list of issues to face. From the constant barrage ...
For enterprises, the strategy of ‘one-size, fits most’ doesn’t work in the enterprise. OneTrust's privacy expert Rob Hinson agrees that ...
With the opening of the local SOC in the 13th country, the company’s cybersecurity offering is now truly global.
There has been a shift to focus more on the development of technologies to combat cyber threats as businesses come ...
The ability to securely manage and process data at the edge, while having direct, secure and low-latency connectivity to partners ...
NEC will provide INTERPOL's Cybercrime Programme - which is based in Singapore - with services that contribute to cybercrime investigation.
The process of detecting, triaging, investigating, and containing a cyber incident takes Singapore organizations an average of 118 hours.
Singapore organizations (78%) don’t think about cybersecurity before embarking on digital transformation projects.
Singapore organizations (78%) don’t think about cybersecurity before embarking on digital transformation projects.
Sophos 2020 Threat Report shows how cyberattackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting ...
We find out why despite spending billions on cybersecurity and risk management, companies are losing the fight to protect their ...
While 5G as a technology promises higher security protocols and standards that are superior to current 4G networks, the net ...
In August 2019, 4.3 million WannaCry infection attempts were stopped worldwide by Sophos-protected endpoints – 4.1 percent of these stopped ...
More than two years after the infamous Wannacry ransomware crippled medical facilities and other organizations worldwide, the healthcare sector seems ...
You can have the best, most up-to-date security solution in the world but if you, or your colleagues, don’t practise ...
Juniper Research forecasts that cybercrime will tip $5 trillion in 2024, from $3 trillion annually in 2018. The company says ...
New FM Global survey suggests that CFOs may be misreading cyber insurance coverage as blanket protection against cyberattacks – not ...
FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl