Cloud security breaches soar as encryption rates remain low
As the use of the cloud continues to be strategically vital to many organisations, cloud resources have become the biggest...
Read moreDetailsAs the use of the cloud continues to be strategically vital to many organisations, cloud resources have become the biggest...
Read moreDetailsCybersecurity is a growing concern for critical infrastructure in Southeast Asia and Hong Kong. Governments are implementing regulations like the...
Read moreDetailsAccording to a Forrester Consulting study commissioned by Tenable, 41% of Asia-Pacific (APAC) organisations view generative AI (GenAI) as a...
Read moreDetailsAs more businesses move to the cloud, their digital environments have become more complex and vulnerable to attacks. To address...
Read moreDetailsHewlett Packard Enterprise is expanding its security-focused, AI-powered networking portfolio. This includes introducing network detection and response (NDR) capabilities powered...
Read moreDetailsThe Forescout Technologies-Finite State report, Rough Around the Edges, revealed that OT and IoT cellular routers, and others used in...
Read moreDetailsIn the State of the Internet (SOTI) report, Digital Fortresses Under Siege: Threats to Modern Application Architectures, Akamai observed more...
Read moreDetailsCybersecurity teams are inundated with troves of fragmented vulnerability and threat intelligence data, but Tenable Research reveals that only 3%...
Read moreDetailsKatie Norton “The mobile ecosystem is diverse, with seemingly endless permutations of apps, exploits, operating systems, and device types. Detecting...
Read moreDetailsConcern about artificial intelligence (AI)-enhanced malicious attacks again topped Gartner’s emerging risk rankings in the second quarter of 2024. Additionally,...
Read moreDetailsFutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl