Outshift Leads the Way with AI at RSA Conference 2024

Outshift Leads the Way with AI at RSA Conference 2024

The latest AI-based enhancements for Panoptica will help customers build a complete Cloud Native Application Protection Platform solution. Outshift by Cisco continues to double down on its investment in cloud application security and artificial intelligence capabilities within its Panoptica product, demonstrating Outshift’s commitment to delivering industry-leading AI products. Looking ahead, AI will be at the forefront of Panoptica’s new features and capabilities, ensuring that customers’ growing application security needs are met, allowing them to keep…

Read More

Top 5 Global Cyber Security Trends of 2023, According to Google Report

Top 5 Global Cyber Security Trends of 2023, According to Google Report

It is taking less time for organisations to detect attackers in their environment, a report by Mandiant Consulting, a part of Google Cloud, has found. This suggests that companies are strengthening their security posture. The M-Trends 2024 report also highlighted that the top targeted industries of 2023 were financial services, business and professional services, tech, retail and hospitality, healthcare and government. This aligns with the fact that 52% of attackers were primarily motivated by financial…

Read More

Increasing cybersecurity awareness and skills training across India

Increasing cybersecurity awareness and skills training across India

The Social Impact Partner Spotlight series highlights various Cisco non-profit organization partners that are helping transform the lives of individuals and communities. This blog features Cisco’s partnership with the NIIT Foundation, highlighting its impactful work around cybersecurity education and awareness. India has the world’s second-largest internet user base. While digitization is rapidly increasing, the vulnerability towards cyber threats is also rising. A major threat to security is around personal information, organizational data, and national security….

Read More

Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams

Women in Cybersecurity: ISC2 Survey Shows Pay Gap and Benefits of Inclusive Teams

Only 17% of respondents to the ISC2 Cybersecurity Workforce Study were women, showing a continued struggle for workplaces to recruit and retain women in this industry. This year’s report shows positive trends as well, with younger women finding paths into cybersecurity careers. ISC2 provided a detailed look at the state of women in the workforce, as well as tips for how to attract and retain diverse talent. ISC2 surveyed 14,865 cybersecurity practitioners in North America,…

Read More

Apple Alerts iPhone Users to Mercenary Spyware Attacks

Apple Alerts iPhone Users to Mercenary Spyware Attacks

Apple sent a threat notification to iPhone users in 92 countries on April 10 informing them that their device was “being targeted by a mercenary spyware attack.” The alert, sent at 12:00 p.m. Pacific Time, told recipients that the attackers were attempting to “remotely compromise” their phone and that they were likely being targeted specifically “because of who you are or what you do.” Apple’s notification did not identify the alleged attackers, nor did it…

Read More

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted

Organisations that have backed up their sensitive data may believe they are relatively safe from ransomware attacks; however, this is not the case based on findings from a new study from IT security company Sophos. The report showed that cybercriminals attempted to compromise the backups of 94% of companies hit by ransomware in the past year. Attackers are aware that those who fall victim to ransomware must choose to either pay the ransom or recover…

Read More

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

XZ Utils Supply Chain Attack: A Threat Actor Spent Two Years to Implement a Linux Backdoor

A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils, a free software command-line data compressor widely used in Linux systems. The attacker slowly managed to integrate a backdoor in the software that was designed to interfere with SSHD and allow remote code execution via an SSH login certificate. The backdoor was discovered a few days before being released on several Linux systems worldwide. The…

Read More

How to Steer Clear of Tax Season Scams

How to Steer Clear of Tax Season Scams

It’s that time of year again – tax season! Whether you’ve already filed in the hopes of an early refund or have yet to start the process, one thing is for sure: cybercriminals will certainly use tax season as a means to get victims to give up their personal and financial information. This time of year is advantageous for malicious actors since the IRS and tax preparers are some of the few people who actually…

Read More

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

The business-to-business market will see a number of big changes in the years to 2030, according to a new report from customer experience firm Merkle. APAC regional B2B enterprises will need to consider their levels of investment in a number of technologies and integrating new tools now to prepare for and adapt to the coming changes. The B2B Futures: The View From 2030 report argues four key “seismic” trends are coming to B2B: A rise…

Read More

Unlocking the Future of Government Cybersecurity: Insights from CyberScoop's Zero Trust Summit

Unlocking the Future of Government Cybersecurity: Insights from CyberScoop's Zero Trust Summit

Navigating Zero Trust with Advanced Visibility and AI-Powered Cyber Defense Visibility is essential and foundational to effectively addressing governmental zero trust mandates and guidance. Observability must extend to users, devices, identity, infrastructure, workflows, applications, workloads, and data. Although vital, visibility alone is insufficient to realize effective cybersecurity. Government organizations must also be able to apply analytics to understand anomalous activity and then drive automation and orchestration to dynamically respond to and reconfigure infrastructure to prevent…

Read More
1 8 9 10 11 12 22