Ransomware is expanding and diversifying according to the Elastic Global Threat Report, issued by Elastic Security Labs.  “Today’s threat landscape is truly borderless,...
Read moreDetailsOne of the characteristics of the recent decade is an increasingly connected global community with some events that occur in...
Read moreDetailsA majority (58%) of organisations still use username-password combinations, making it the most widely deployed form of authentication according to an S&P...
Read moreDetailsArtificial intelligence has been immortalised in movies with hits like "Bicentennial Man", "Upgrade" and its namesake "Artificial Intelligence" by Steven...
Read moreDetailsThere is an urgent need for upgraded cybersecurity in the retail industry according to a report released by Arcserve during Cyber Security...
Read moreDetailsThe website and members portal of the Philippine Health Insurance Corporation (PhilHealth) were restored following the hacking of its database due to...
Read moreDetailsBackup and disaster recovery solutions came into the market in 1978. At the time, however, the primary concerns were driven...
Read moreDetailsWith any data, we need to ensure measures are in place to secure the data at each stage of its...
Read moreDetailsI’m thrilled to announce our latest research into a problem as old as time (or, at least, my time —...
Read moreDetailsGartner says the mass availability of generative AI has become a top concern for enterprise risk executives in the second...
Read moreDetailsFutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl