cybersecurity

Defending against cyber grinches: AI for enhanced security

As the festive season approaches, it brings not only joy and celebrations but also a surge in cyber threats. Alarmingly, 84% of businesses have suffered a phishing attack, making cyber crime the world’s third-largest economy after the US and China. This isn’t set to slow down any time soon, with the estimated cost of global…

Defending against cyber grinches: AI for enhanced security Read More »

CISOs: Don’t rely solely on technical defences in 2025

Threats have been more sophisticated, unpredictable and harder to pin down. Attackers don’t just exploit technical weaknesses – they target human behaviour, organisational blind spots, and even regulatory loopholes. From spear phishing and deepfake fraud to misinformation generated by artificial intelligence (AI), cyber criminals are using emerging technologies to launch attacks with precision and ease.…

CISOs: Don’t rely solely on technical defences in 2025 Read More »

Decoding the end of the decade: What CISOs should watch out for

It’s that time of year where we, in the industry, attempt to be cyber soothsayers. A tall order – even more so when you’re trying to look ahead to 2030. The cyber security landscape is in a state of flux, and the past five years has kept us on our toes. As I do my…

Decoding the end of the decade: What CISOs should watch out for Read More »

Underfunded, under pressure: We must act to support cyber teams

Cyber resilience has dominated headlines this year as major outages impacting people, businesses, and public services hit the headlines. But what about the cyber security professionals working behind the scenes? Although they often receive little media attention, the importance of their role in safeguarding day-to-day life has never been clearer. As AI technologies become more…

Underfunded, under pressure: We must act to support cyber teams Read More »

Thieves found a crazy new way to steal your AT&T iPhone 16

Having my iPhone stolen is a nightmare scenario, but I’m prepared for it already. I’m not as worried about the device going missing as I am about protecting and recovering my data. The iPhone is the most important computer in my life, after all. Thankfully, Apple makes it easy to back up all my data,…

Thieves found a crazy new way to steal your AT&T iPhone 16 Read More »

IAM best practices for cloud environments to combat cyber attacks

Organisations are constantly looking to identify different use cases to integrate AI into their business processes and accelerate the adoption of generative AI technologies. Companies are also finding ways to build innovative AI solutions to meet this demand. As a result, the usage of cloud infrastructure and, thereby, the global cloud computing footprint continues to…

IAM best practices for cloud environments to combat cyber attacks Read More »

Cyber companies need a best practice approach to major incidents.

Cyber security companies have made global headlines recently with a series of significant incidents which caused widespread disruption. The CrowdStrike incident is estimated to have cost Fortune 500 companies as much as $5.4bn, according to Parametrix analysis. The Okta data breach and Ivanti Virtual Private Network (VPN) vulnerabilities raise similar concerns about the impact cyber…

Cyber companies need a best practice approach to major incidents. Read More »

HSBC tests post-quantum VPN tunnel for digital ledgers

HSBC has worked with Quantinuum to trial “the first application” of quantum-secure technology for distributing tokenised physical gold. The HSBC Gold Token for retail investors in Hong Kong allows the bank’s customers to acquire fractional ownership of physical gold. Moving these tokens over financial networks requires encryption that cannot be broken by high-performance quantum computers…

HSBC tests post-quantum VPN tunnel for digital ledgers Read More »

Cyber firms need to centre their own resilience

Information security is essentially an information risk management discipline. By rendering many information systems inoperable, the global outage precipitated by Crowdstrike prevented several companies from accessing critical business information due to unplanned and extended downtime. The unavailability was not only to information systems, but also to related information processing. It was not only an information…

Cyber firms need to centre their own resilience Read More »

300,000 users of a top car rental company had their data stolen

In the latest of a neverending string of data breaches, the car rental company Avis has revealed that the data of nearly 300,000 users was stolen by hackers.As explained in a letter to affected customers, Avis discovered that an unauthorized third party had gained access to one of its business applications on August 5, 2024.…

300,000 users of a top car rental company had their data stolen Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top