Blog
AI is the Future of Cybersecurity
October 10, 2024
0 Comment
By Dr. Gleb Tsipursky
Artificial Intelligence (AI) is revolutionizing cybersecurity across industries, bringing new capabilities and unprecedented potential for innovation. However, it also introduces significant risks, as evidenced by recent high-profile breaches in prominent AI firms. To navigate these challenges, companies must reimagine their approach to cybersecurity, adopting strategies that prioritize data integrity and local
Active Data Security Posture Management: A New Frontier In Cloud Data Security
October 9, 2024
0 Comment
by David Linthicum
Cloud data security is currently facing a significant threat, with more than 35% of cloud security incidents occurring from the use of valid, compromised credentials by attackers. This data underscores the urgent need for organizations to swiftly implement robust security measures and prepare for potential incidents. Data security posture management (DSPM) emerges
Not Investing in a Cloud Security Program can be Expensive
October 7, 2024
0 Comment
By Navin Govindarasu
A well-planned cloud security program serves as the primary barrier against security breaches, protecting both the company’s assets and its reputation. It’s a crucial component that supports an organisation’s overall health and in a world with more advanced cyber threats, it helps meet the basic compliance standards that stakeholders expect.
By Lisa Gibbons
Using Blockchain and AI to tackle the rise of data breaches A recent report by cyber threat intelligence platform Cyble has found 90 cybercriminal claims of successful supply chain attacks in a six-month period that encompassed February 2024 to mid-August 2024. Not surprising given their reach, IT providers suffered the greatest number
The history of cybersecurity
October 3, 2024
0 Comment
By Vikki Davies
Where did cybersecurity begin? Cyber magazine takes a look at the history of cybersecurity from inception to the present day. Cybersecurity is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of