Ferrari apuesta por la interfaz hombre-máquina en los vehículos de nueva generación

Ferrari apuesta por la interfaz hombre-máquina en los vehículos de nueva generación

Ferrari amplía el acuerdo de colaboración con su partner tecnológico DXC. El fabricante italiano busca potenciar el desarrollo de las próximas generaciones de sistemas de información y entretenimiento en los vehículos de la casa, permitiendo a los conductores estar más cerca de la funcionalidad de alto rendimiento. Así, gracias a su amplia experiencia en la industria del automóvil, DXC ayudará a garantizar que los sistemas de infoentretenimiento de Ferrari estén diseñados para brindar una experiencia…

Read More

Former CIA Analyst Pleads Guilty to Sharing Top Secret Files

Former CIA Analyst Pleads Guilty to Sharing Top Secret Files

A former CIA analyst shared top secret documents on social media and then tried to cover his tracks by destroying his personal devices, according to the Department of Justice (DoJ). Asif William Rahman, 34, of Vienna, is facing a maximum term of 10 years behind bars after pleading guilty on Friday to two counts of willful retention and transmission of classified information related to national defense.  A CIA employee since 2016, Rahman “repeatedly” accessed and…

Read More

El 80% de las empresas españolas perfila la IA como prioridad estratégica para este 2025

El 80% de las empresas españolas perfila la IA como prioridad estratégica para este 2025

En el caso de España, el 81% de las empresas considera la IA y la IA generativa como una de las tres principales prioridades estratégicas para este año 2025, ubicándose por encima de la media mundial (75%) y en los primeros lugares de la clasificación, solo superado por India (82%). Respecto al aporte de la IA, el 29% de las compañías españolas considera que la IA está aportando un valor significativo a su negocio, ubicándose…

Read More

Intersec 2025: Middle East CISOs focus on AI

Intersec 2025: Middle East CISOs focus on AI

The growing threat posed by Agentic AI and disinformation has become one of the most critical challenges in the cybersecurity landscape. At the inaugural CISO Business Briefing, held as part of Intersec 2025, cybersecurity experts and industry leaders gathered to explore the implications of these emerging risks and strategies to mitigate them. The event, hosted at the Dubai World Trade Centre, highlighted the urgent need for organizations to adapt their cybersecurity measures to address the…

Read More

Managing Security and Compliance in a Remote Work Environment

Managing Security and Compliance in a Remote Work Environment

Remote work isn’t just a temporary trend anymore; it has become a permanent fixture. What began as a quick response during the pandemic has evolved into the new normal for businesses worldwide. In America, 20% of people now work from home. While this has its advantages (flexibility for workers and cost savings for businesses), it’s not without its complications, having cracked open a host of issues around cybersecurity and regulatory compliance. To address these challenges,…

Read More

Hotel Guest Data Exposed After Otelier Breach

Hotel Guest Data Exposed After Otelier Breach

Customers of some of the world’s best-known hotel chains have had their personal information compromised after a threat actor targeted an industry software supplier, it has emerged. The threat actor appears to have gained unauthorized access to hotel management software provider Otelier. The firm’s cloud-based software helps hotels optimize their operations. It claims to support “the world’s best hospitality brands, owners, and operators across over 10,000 properties.” According to data breach notification site HaveIBeenPwned (HIBP),…

Read More

Think You Know Tripwire? Think Again

Think You Know Tripwire? Think Again

Fortra’s Tripwire has always been widely known as a File Integrity Monitoring (FIM) solution, and a very good one at that. The good news is that it still is – only when you look closely, it’s a lot more. And it always has been. Besides its traditionally known role as an integrity and security configuration management tool, Tripwire’s powerful capabilities make it a comprehensive cybersecurity solution. Did you know that with Tripwire, you could: Detect advanced persistent…

Read More

CIS Control 06: Access Control Management

CIS Control 06: Access Control Management

CIS Control 6 merges some aspects of CIS Control 4 (admin privileges) and CIS Control 14 (access on a need-to-know basis) into a single access control management group. Access control management is a critical component in maintaining information and system security, restricting access to assets based on role and need. It is important to grant, refuse, and remove access in a standardized, timely, and repeatable way across an entire organization. Privileged accounts, such as administrators, should…

Read More

La IA generativa, la gran apuesta tecnológica para 2025

La IA generativa, la gran apuesta tecnológica para 2025

En su experiencia, las organizaciones en estas industrias están desarrollando el potencial de esta herramienta en su integración con la IA de experiencia de cliente; no se limitan a atender y resolver dudas, sino que toman un papel más activo para, por ejemplo, apoyar en ventas. En esta misma dirección apuntan desde PwC cuando señalan que las telecos apostarán por soluciones inteligentes híbridas, que integren la IA generativa con otras tecnologías como el machine learning…

Read More

EU DORA 본격 시행··· 전문가들 “사이버보안 격차 심화될 수 있다”

EU DORA 본격 시행··· 전문가들 “사이버보안 격차 심화될 수 있다”

소세이프(SoSafe)의 CSO인 앤드류 로즈는 DORA의 범위에 이런 수준의 규제를 처음 접하는 기업도 포함된다고 언급했다. 그는 “신용평가 기관과 특정 유형의 면제 대출, 팩토링, 미니본드, 암호화폐 거래소, P2P 대출 플랫폼과 같은 새로운 금융 모델과 관련된 비규제 기업들이 DORA의 범위에 포함된다. 이들에게는 DORA 요구사항이 솔루션과 인력에 대한 지출이 필요한 새로운 수준의 통제와 공식화된 감독을 의무화할 수 있다”라고 지적했다. 규제 준수의 문제점 오렌지 사이버디펜스(Orange Cyberdefense) 조사에 따르면 DORA 준비 기간이 2년에 달했지만, 영국 금융 서비스 산업의 43%가 최소 3개월…

Read More
1 13 14 15 16 17 3,867