The role of humans in an organisation’s security is double-edged—a security threat on one side and a vital security asset on the...
Read moreDetailsIt should come as no surprise that the challenges and opportunities differed from country to country. Region-specific factors can vastly...
Read moreDetailsForrester predicts that 90% of data breaches will include the human element in 2024. Yet our efforts in understanding and managing...
Read moreDetailsLarge language models (LLM) have been the talk of the town for the past few years as natural language processing chatbots...
Read moreDetailsFor the longest time, we’ve been told that the best defence against cyberattacks is to use a defence-in-depth (DID) strategy,...
Read moreDetailsSecurity Operations (SecOps) is where IT operations and IT security come together. It is one of those few places in...
Read moreDetailsFormer cybersecurity consultant, now freelance writer and author, John Meah, wrote on Techopedia that besides the potential benefits of artificial...
Read moreDetails126 business emails (per person) go out daily or 124.5 billion work emails get sent and received every day. The...
Read moreDetailsThe WEF Global Cybersecurity Outlook 2024 reveals a divide between those who are resilient and those who aren’t. Emerging technologies...
Read moreDetailsFrom the Greek word authentikos, authentication, the act of verifying an identity, continues to evolve. Depending on the context, authentication...
Read moreDetailsFutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl