-0 C
New York

Tag: cyber security

The PII Vault: Protecting Personal Identifiable Information in the Digital Age

In today's digital age, personal identifiable information (PII) has become a valuable commodity for cybercriminals. From financial information to medical records, PII can be...

Winning CyberSecurity Budget: The Value-Based Approach

Cybersecurity is no longer a luxury, but a necessity for businesses however, it's common for security to be viewed as a cost center, which...

Survey: At Least 20% of Enterprise Endpoints Have Legacy Security Vulnerabilities

A new report from Action1 Corporation has revealed that at least 20% of enterprise endpoints still have legacy security vulnerabilities. The survey, based on...

Agnidipta Sarkar, Group CISO at Biocon: Thought Leaders Interview Series

We had the pleasure of interviewing Agnidipta Sarkar, a highly regarded Digital Resilience Practitioner and Group CISO at Biocon, a leading Indian biopharmaceutical company....

IBM Security X-Force Threat Intelligence Index 2023:Key findings

The IBM X-Force Threat Intelligence Index 2023 report has been released, revealing key insights and trends in cyber threats across the globe. The IBM...

6 Practices to Ditch for Effective Vulnerability Management

Vulnerabilities in technology environments have become increasingly prevalent, with the number of identified flaws growing exponentially in the past two decades. The first vulnerability...
spot_imgspot_imgspot_imgspot_img

Subscribe

Popular articles

6 Tech-Based Fuel Management Tools to Help Minimise Costs and Maximise Value

Fuel is a necessary component in almost every industrial...

Is a Fractional CIO or Fractional CIO Right for Your Business?

Technology is key to modern business, whether it’s cybersecurity...

Major Events of the Crypto World in 2024: What Has Changed?

The year of 2024 became a real accelerator of...