Protecting Utilities: Top Criminal and Terrorist Targets

Protecting Utilities: Top Criminal and Terrorist Targets

<!– Protecting Utilities: Top Criminal and Terrorist Targets | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

What you need to know about PCI 4.0: Requirements 5, 6, 7, 8 and 9

What you need to know about PCI 4.0: Requirements 5, 6, 7, 8 and 9

In Part 1 of this series, we reviewed the first four sections of the new PCI standards. As we continue our examination of PCI DSS version 4.0, we will consider what organizations will need to do in order to successfully transition and satisfy this update. Requirements 5 through 9 are organized under two categories: Maintain a Vulnerability Management Program Requirement 5: Protect All Systems and Networks from Malicious Software Requirement 6: Develop and Maintain Secure…

Read More

A Window Into the Future of Data in Motion and What It Means for Businesses

A Window Into the Future of Data in Motion and What It Means for Businesses

Modern businesses have vast amounts of data at their fingertips and are acutely aware of how enterprise data strategies positively impact business outcomes. Despite this, only a handful of organisations interact with all stages of the data life cycle process to truly distill information that distinguishes future-ready businesses from the rest. Much potential remains untapped when businesses do not translate their data into actionable insights from the point it is created, eroding the usefulness of data over…

Read More

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform

Trend Micro CEO Discusses Need for a Unified Cybersecurity Platform Risk Management In the face of evolving cyberattacks, an ever-expanding digital attack surface, and a global skills shortage, organizations need a more unified approach to managing cyber risk. Trend Micro co-founder & CEO Eva Chen discusses our vision and strategy for delivering a unified cybersecurity platform. By: Trend Micro June 23, 2022 Read time:  ( words) Undoubtedly, COVID-19 has been a big accelerant for digital…

Read More

Innovating nonstop together for a better green digital life

Innovating nonstop together for a better green digital life

The digital economy has become a major engine of the global economy. Green and low-carbon technologies have become new drivers for sustainable development. Asia-Pacific is ripe with opportunities for digital transformation, and a digital Asia-Pacific is rapidly approaching.  According to the ASEAN Development Outlook report and the Southeast Asia Digital Economy Report, by 2030, ASEAN will become the fourth-largest economy in the world. The region’s internet economy market is expected to reach $1 trillion. In…

Read More

Fostering digital talents to achieve the goals of the ASEAN Digital Masterplan 2025

Fostering digital talents to achieve the goals of the ASEAN Digital Masterplan 2025

The Association of Southeast Asian Nations’ (ASEAN) journey toward a digital economy and digital society has been radically accelerated by the COVID-19 pandemic over the last two years. This situation has led to an unprecedented rise in demand for digital skills while further stressing the importance of having a conducive learning ecosystem capable of cultivating more digital talents in the region. ASEAN’s commitment to building a sustainable digital talent ecosystem is epitomized by the ASEAN Digital Masterplan…

Read More

Linux Foundation works toward improved data-center efficiency

Linux Foundation works toward improved data-center efficiency

Organizations exploring the use of data-processing units (DPU) and infrastructure processing units (IPU) got a boost this week as the Linux Foundation announced a project to make them integral to future data-center and cloud-based infrastructures. DPUs, IPUs, and smartNICs are programmable networking devices designed to free-up CPUs for better performance in software-defined cloud, compute, networking, storage and security services. The new plan, called the Open Programmable Infrastructure (OPI) Project calls for creating a community that…

Read More

Telecom companies, FAA strike deal on 5G interference for airplanes

Telecom companies, FAA strike deal on 5G interference for airplanes

New equipment for older airplanes is the latest step forward in the ongoing dispute between the major telecom companies and the Federal Aviation Administration, as regulators agree to further measures aimed at reducing perceived safety risks caused by 5G service. The concerns center on interference—the frequencies used by radioaltimeter systems, which are an important safety feature for landing aircraft, are close to those used by some kinds of 5G services. The FAA has long expressed…

Read More

Gartner reveals 8 cybersecurity predictions for the next 4 years

Gartner reveals 8 cybersecurity predictions for the next 4 years

The cybersecurity company went into great detail on some of the sweeping cybersecurity changes anticipated over the next four years. Image: Favebrush/Adobe Stock As part of Gartner’s Security & Risk Management Summit wrapping up today in Sydney, analysts from the company have unveiled eight predictions from within the cybersecurity sphere from 2022 to 2026. Several big changes to the security landscape were forecasted by Gartner, and the analytical firm urges that cybersecurity executives build these…

Read More

Why organizations are keen on zero trust but are slow to adopt it

Why organizations are keen on zero trust but are slow to adopt it

Most organizations surveyed by Banyan Security consider zero trust a priority, but many see it as difficult and expensive to implement. Image: metamorworks, Getty Images/iStockphoto As cyberattacks have increasingly threatened organizations, zero trust has become more of a go-to method for protecting sensitive data and assets. Zero trust lets you limit access on an as-needed basis, and with the promise of greater protection, it is on the radar for many organizations. But adopting this type…

Read More
1 2,913 2,914 2,915 2,916 2,917 4,091