Indian CISOs to prioritize endpoint and cloud security spending in 2024 and beyond
Read moreDetailsGartner has identified three key areas for chief information security officers (CISOs) to focus on to augment their cybersecurity approach...
Read moreDetailsESET researchers uncovered a sophisticated crimeware campaign targeting clients of three Czech banks. The malware, dubbed NGate, has a unique...
Read moreDetailsHewlett Packard Enterprise is expanding its security-focused, AI-powered networking portfolio. This includes introducing network detection and response (NDR) capabilities powered...
Read moreDetailsThe Forescout Technologies-Finite State report, Rough Around the Edges, revealed that OT and IoT cellular routers, and others used in...
Read moreDetailsCybersecurity teams are inundated with troves of fragmented vulnerability and threat intelligence data, but Tenable Research reveals that only 3%...
Read moreDetailsKatie Norton “The mobile ecosystem is diverse, with seemingly endless permutations of apps, exploits, operating systems, and device types. Detecting...
Read moreDetailsThere was a time when security was defined by enterprises as the perimeter. At the time it was believed that...
Read moreDetailsAs organisations increasingly migrate their operations to the cloud, ensuring the security of cloud workloads has become a critical priority....
Read moreDetailsWhile previous Olympic games have faced cybersecurity threats, the Games of the XXXIII Olympiad, also known as Paris 2024, will...
Read moreDetailsFutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl