Ukraine’s State Registers Restored Following Cyber-Attack

Ukraine’s State Registers Restored Following Cyber-Attack

The infrastructure of Ukraine’s state registers has been fully restored following a large-scale cyber-attack which was attributed to Russia’s military intelligence services (GRU). Olga Stefanishyna, the Ukrainian Minister of Justice and Deputy Prime Minister for European and Euro-Atlantic Integration of Ukraine, announced in a Facebook post on January 20 that the Unified and State Registers were now “fully operational.” Russian attackers were unsuccessful in their objectives during the cyber-attack and no information from the registers…

Read More

HTTP 1.1 Vs. HTTP 2: What Are the Differences?

HTTP 1.1 Vs. HTTP 2: What Are the Differences?

According to this recent report by McKinsey, 87% of consumers say they won’t do business with your company if they have concerns about your security practices. So if you’re serious about protecting your company’s reputation and bottom line, data privacy can never take a back role. To be able to transfer data efficiently over networks, one of the key technologies you will want to implement is the HyperText Transfer Protocol (HTTP). But still with HTTP, there are…

Read More

12 formas de crecer como líder de TI en 2025

12 formas de crecer como líder de TI en 2025

En términos de ser más intencional, Rossmiller está trabajando para: cambiar los estilos de liderazgo para satisfacer las necesidades del momento; estar más presente; comunicar claramente a su equipo y a la comunidad universitaria lo que está sucediendo dentro de TI; empoderar a cada trabajador individual; y escuchar activamente al personal para poder comprender realmente sus puntos. Dice que también está tratando de reducir el ritmo y solicitar retroalimentación como parte de sus esfuerzos de…

Read More

US Sanctions Chinese Hackers for Treasury, Telecom Breaches

US Sanctions Chinese Hackers for Treasury, Telecom Breaches

The US has sanctioned Chinese state cyber actors over the recent compromises of the Department of the Treasury and multiple telecoms providers, respectively. Shanghai-based Yin Kecheng was involved in the hack of US Treasury computers via third-party cybersecurity vendor BeyondTrust in December 2024, according to the Department of the Treasury’s Office of Foreign Assets Control (OFAC). The attackers were able to access unclassified documents held in certain Treasury Departmental Offices (DO) workstations. Bloomberg reported that…

Read More

Cloud infrastructure spending more than doubles in the third quarter of 2024

Cloud infrastructure spending more than doubles in the third quarter of 2024

Year-end and future projections For 2024, IDC projects a 74.3% year-over-year growth in cloud infrastructure spending, reaching $192 billion. Non-cloud infrastructure is expected to see a more modest increase of 17.9%, totaling $71.4 billion. Shared cloud is set to drive much of this growth, with a forecasted 88.9% year-over-year increase to $157.8 billion. Dedicated cloud infrastructure spending is expected to grow 28.6%, reaching $34.2 billion, according to the report. Globally, service providers are expected to…

Read More

Ferrari apuesta por la interfaz hombre-máquina en los vehículos de nueva generación

Ferrari apuesta por la interfaz hombre-máquina en los vehículos de nueva generación

Ferrari amplía el acuerdo de colaboración con su partner tecnológico DXC. El fabricante italiano busca potenciar el desarrollo de las próximas generaciones de sistemas de información y entretenimiento en los vehículos de la casa, permitiendo a los conductores estar más cerca de la funcionalidad de alto rendimiento. Así, gracias a su amplia experiencia en la industria del automóvil, DXC ayudará a garantizar que los sistemas de infoentretenimiento de Ferrari estén diseñados para brindar una experiencia…

Read More

Former CIA Analyst Pleads Guilty to Sharing Top Secret Files

Former CIA Analyst Pleads Guilty to Sharing Top Secret Files

A former CIA analyst shared top secret documents on social media and then tried to cover his tracks by destroying his personal devices, according to the Department of Justice (DoJ). Asif William Rahman, 34, of Vienna, is facing a maximum term of 10 years behind bars after pleading guilty on Friday to two counts of willful retention and transmission of classified information related to national defense.  A CIA employee since 2016, Rahman “repeatedly” accessed and…

Read More

El 80% de las empresas españolas perfila la IA como prioridad estratégica para este 2025

El 80% de las empresas españolas perfila la IA como prioridad estratégica para este 2025

En el caso de España, el 81% de las empresas considera la IA y la IA generativa como una de las tres principales prioridades estratégicas para este año 2025, ubicándose por encima de la media mundial (75%) y en los primeros lugares de la clasificación, solo superado por India (82%). Respecto al aporte de la IA, el 29% de las compañías españolas considera que la IA está aportando un valor significativo a su negocio, ubicándose…

Read More

Intersec 2025: Middle East CISOs focus on AI

Intersec 2025: Middle East CISOs focus on AI

The growing threat posed by Agentic AI and disinformation has become one of the most critical challenges in the cybersecurity landscape. At the inaugural CISO Business Briefing, held as part of Intersec 2025, cybersecurity experts and industry leaders gathered to explore the implications of these emerging risks and strategies to mitigate them. The event, hosted at the Dubai World Trade Centre, highlighted the urgent need for organizations to adapt their cybersecurity measures to address the…

Read More

Managing Security and Compliance in a Remote Work Environment

Managing Security and Compliance in a Remote Work Environment

Remote work isn’t just a temporary trend anymore; it has become a permanent fixture. What began as a quick response during the pandemic has evolved into the new normal for businesses worldwide. In America, 20% of people now work from home. While this has its advantages (flexibility for workers and cost savings for businesses), it’s not without its complications, having cracked open a host of issues around cybersecurity and regulatory compliance. To address these challenges,…

Read More
1 222 223 224 225 226 3,810