Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Building Contextual Data Models for Identity Related Threat Detection & Response (ITDR)

Amid the rising pace of digitization, a growing number of organizations are managing their workloads based on a hybrid model. A hybrid model by design leads to dispersion of corporate data across different environments. Against this backdrop, it has become more difficult than ever to secure and protect the data from many digital identities that are used to access various systems. While security components like multifactor authentication (MFA), Single Sign-On (SSO), and Password Vaulting, among…

Read More

From data to decisions: Graham Construction's digital journey

From data to decisions: Graham Construction's digital journey

The importance of diversity in teams  As an immigrant, a woman, and a member of the LGBTQ community, I understand the value of diverse perspectives. Technology, like many industries, has historically been male-dominated. However, I am passionate about fostering diversity because it brings different viewpoints and approaches to problem-solving. Diverse teams are more innovative, and they produce better outcomes.  In the context of product development, diversity plays a critical role. By bringing together individuals from…

Read More

What Is GRC? Understanding Governance, Risk, and Compliance

What Is GRC? Understanding Governance, Risk, and Compliance

Governance, risk, and compliance, often called GRC, is a blanket term that describes the strategies and technologies used to manage an organization’s compliance with regulatory mandates and corporate governance standards. The concept of GRC can be traced back to 2003, but the topic was first extensively discussed in a peer-reviewed paper by Scott L. Mitchell, published in the International Journal of Disclosure and Governance in 2007. This guide discusses what GRC is and what it…

Read More

Security Detection Tech Failing, Say Cyber Leaders

Security Detection Tech Failing, Say Cyber Leaders

Almost three-quarters (74%) of IT security directors in regulated industries in the US and UK believe detection-based security technologies are outdated and inadequate. This surprising finding comes from Everfox’s latest CYBER360 report, a survey of 1000 IT and security leaders in government, defense and financial services across the US and UK. The report, published on February 12, 2025, lays bare the exceptionally high volume of cyber-attacks suffered by regulated organizations, with 97% of respondents saying…

Read More

CIS Control 02: Inventory and Control of Software Assets

CIS Control 02: Inventory and Control of Software Assets

Today, I will be going over Control 2 from version 8.1 of the top 18 CIS Controls – Inventory and Control of Software Assets. I will go over the seven safeguards and offer my thoughts on what I’ve found. Key Takeaways for Control 2 Reusability. The tools that were mentioned in Control 1 will be used in Control 2 as well. Reusing tools that accomplish goals for both Controls 1 and 2 can help cut…

Read More

Holding the Tide Against the Next Wave of Phishing Scams

Holding the Tide Against the Next Wave of Phishing Scams

By now, we should all be pretty well acquainted with phishing scams. They’ve been around for a very long time—nearly 30 years, in fact—and are the primary focus of most security awareness training programs and initiatives. Despite this, phishing remains remarkably effective, with over 90% of successful cyberattacks beginning with a phishing email. Why? Because these scams are constantly evolving. To protect against the next wave of phishing scams, it’s important to understand them. As…

Read More

Huawei Cloud fuels Saudi Arabia's AI ambitions at LEAP 2025

Huawei Cloud fuels Saudi Arabia's AI ambitions at LEAP 2025

At LEAP 2025, Huawei Cloud demonstrated its commitment to Saudi Arabia’s AI leadership, showcasing its Riyadh Region as a pivotal hub for AI development in the Middle East, Central Asia, and Africa. The company highlighted how its sophisticated infrastructure and AI capabilities are empowering the Kingdom to build locally relevant AI solutions while maintaining data sovereignty. Launched in September 2023, the Huawei Cloud Riyadh Region serves over 1,000 customers and 300 partners across government, finance, media,…

Read More

Will deepfake threats undermine cybersecurity in 2025?

Will deepfake threats undermine cybersecurity in 2025?

Deepfake technology is a new and unsettling reality. When embedded within phishing emails and collaboration chats, deepfakes represent a vicious and growing threat. To combat deepfakes, organizations urgently need to implement fresh approaches to both employee education and cybersecurity. To convey the gravitas of the situation, in February of 2024, a Singapore-based company lost $25 million due to deepfake impersonation of the firm’s CFO and other high-level executives. An employee mistakenly believed the deepfake ruse…

Read More

Microsoft Fixes Another Two Actively Exploited Zero-Days

Microsoft Fixes Another Two Actively Exploited Zero-Days

Microsoft has been forced to issue security updates for four more zero-day vulnerabilities, including two currently under active exploitation. The tech giant’s February Patch Tuesday update round features fixes for over 50 CVEs, including 22 remote code execution (RCE) bugs, 19 elevation of privilege (EoP) flaws and two security feature bypass vulnerabilities. The CVEs under active exploitation include CVE-2025-21391, a Windows Storage EoP bug with a CVSS score of 7.1. “At first glance, it ‘only’…

Read More

Claves para que el CIO fiche al mejor equipo de TI 

Claves para que el CIO fiche al mejor equipo de TI 

Sin duda, las conocidas como habilidades blandas o soft skills se han convertido en uno de los valores esenciales a la hora de contratar. ¿También en TI? “Muchas veces, sobre todo en perfiles técnicos, se tiene más en cuenta el conocimiento que las soft skills, que son muy importantes”, valora Fernández. “Si quieres crear una cultura o un ambiente de trabajo concreto dentro de un equipo, hay que darles valor a las dos cosas por…

Read More
1 48 49 50 51 52 2,651