Enterprises are increasingly recognising the benefits of embracing a cloud infrastructure to support on-premise networks, but often create complicated network environments in…
Browsing: CISO
Ponemon Institute study Cybersecurity in Operational Technology: 7 Insights You Need to Know shows the extent cyberattacks experienced by critical infrastructure operators, based on a survey…
“Ethical hackers” beat university cyber-defences in just two hours. As part of our experts comments series, Paul talks about the huge amount of sensitive…
The DCMS today announced its 2019 Cyber Breaches Survey. The latest report highlights the threats that UK businesses face from cyber-attacks. One of…
Millions of Facebook recordswere found to be publicly exposed on an Amazon cloud server, showing that companies haven’t done enough…
It has been reported that a database breach at Georgia Tech has exposed the personal information of up to 1.3 million current and former faculty…
Thycotic’s 2019 State of Privileged Access Management Maturity Report Reveals Alarming Shortcomings in PAM Security Practices Thycotic, a provider of privileged access management…
Following the news that popular South Korean search engines have been targeted by a phishing campaign that utilises the watering hole technique to…
Toyota announced its second data breach on Friday last week, making it the second cyber-security incident the company acknowledged in…
Last year was a year of digital acceleration, as new technologies such as 5G, artificial intelligence and next-gen cloud moved…