Information Security Governance Series – I In the digital economy, where data plays a vital role, information security governance is…
Browsing: GRC
Executive Summary Claroty, in its 2023 Global Healthcare Cybersecurity Study, unveils unsettling revelations about the state of cybersecurity within the…
REST and SOAP APIs are the two most common application protocols that define how to build application programming interfaces (APIs).…
The perpetrators behind the budding Buhti ransomware have abandoned their own payload in favor of exploiting vulnerabilities in Windows and…
CISA & FBI has released a joint Cybersecurity Advisory from government agencies in the United States and Australia to warn…
“AndoryuBot’ is a new malware botnet that infects unpatched Wi-Fi access points for DDoS assaults using a key Ruckus Wireless…
Increasing numbers of organisations are moving to a Zero Trust security model. The growing frequency and sophistication of cyber threats…
What does a “good” cyber-security programme look like? How can we, in our role as Chief Information Security Officer (CISO),…
Data has emerged as a company’s most essential asset in the modern world. Every security team prioritizes protecting sensitive data,…
The Chinese app for e-commerce Pinduoduo is suspected of having used a high-severity Android vulnerability as a zero-day to spy…