Artificial intelligence has been immortalised in movies with hits like "Bicentennial Man", "Upgrade" and its namesake "Artificial Intelligence" by Steven...
Read moreA majority (58%) of organisations still use username-password combinations, making it the most widely deployed form of authentication according to an S&P...
Read moreJeff Pollard Fraud, stock-price manipulation, damage to reputation and the brand, sextortion scams that sabotage employee morale, misinformation, and disinformation....
Read moreThe use of Artificial Intelligence (AI) has been a double-edged sword when it comes to cybersecurity. As technology advances, threat...
Read moreBackup and disaster recovery solutions came into the market in 1978. At the time, however, the primary concerns were driven...
Read moreWith any data, we need to ensure measures are in place to secure the data at each stage of its...
Read moreI’m thrilled to announce our latest research into a problem as old as time (or, at least, my time —...
Read moreGartner says the mass availability of generative AI has become a top concern for enterprise risk executives in the second...
Read moreThe latest IBM Data Breach Report revealed that an alarming 83% of organizations experienced more than one data breach during 2022. According...
Read more"A software supply chain attack occurs when a cyber threat actor infiltrates a software vendor’s network and employs malicious code...
Read moreFutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl