The Critical Role of Data Center Technology in Transforming the Manufacturing Industry

The Critical Role of Data Center Technology in Transforming the Manufacturing Industry

How data centers enhance efficiency, support advanced tech, and ensure data security in manufacturing.  In today’s rapidly evolving digital landscape, data centers are the backbone of IT infrastructure, ensuring the smooth operation of web hosting, cloud computing, data storage, and large-scale enterprise applications. However, the manufacturing industry faces unique challenges and opportunities when it comes to data center technology. This blog will delve into why data center technology is crucial for the manufacturing sector.  Gartner…

Read More

Data breach victims increased by 490% since the first half of 2023

Data breach victims increased by 490% since the first half of 2023

The Identity Theft Resource Center (ITRC) has released a report analyzing H1 data breach incidents for 2024. According to the report, there was a 490% rise in data breach victims in H1 of 2024 compared to H1 of 2023. Yet, Q2 had 732 publicly reported data breaches, which represents a 12% decrease from Q1.  Security leaders weigh in  Stephen Kowski, Field CTO at SlashNext:  “The surge in breach victims is likely due to several large-scale…

Read More

The power of podcasts

The power of podcasts

A goal of the editorial team at Security magazine is to provide insightful thought-leadership focused content from security leaders to our readers through as many routes as possible. One way we do this is through our podcast channel, The Security Podcasts. In addition to our monthly eMagazine and ongoing web coverage, Security magazine regularly releases podcast episodes which feature cybersecurity and physical security leaders from various industries. These security professionals share insights and stories from their experiences and careers providing leadership…

Read More

With the exponential growth of data, new SEC rules need a new approach

With the exponential growth of data, new SEC rules need a new approach

The latest estimates show 328.77 million terabytes of data are created each day, roughly 120 zettabytes per year, compared to just 2 zettabytes in all of 2010. This growth isn’t expected to slow in the coming years, and organizations increasingly rely on this data to make informed business decisions, conduct research and analysis and much more. But managing and securing that growth in data volume poses a challenge for security teams, leading to more breaches…

Read More

CISOs in Australia Urged to Take a Closer Look at Data Breach Risks

CISOs in Australia Urged to Take a Closer Look at Data Breach Risks

Clayton Utz cyber partner Brenton Steenkamp has seen his fair share of cyber attacks. Returning to Australia in October after a seven-year stint in Amsterdam, he has brought home tales of dealing with multiple large ransomware attacks in Europe, as well as the data governance lessons they provided. Steenkamp said he has observed many Australian organisations are yet to assume the “paradigm shifting” view of risk around data estates that is necessary for future data…

Read More

AI-enabled data collection and the regulatory landscape

AI-enabled data collection and the regulatory landscape

As the world embarks on the Fourth Industrial Revolution, one major contributor is Artificial Intelligence (AI), specifically its ability to collect, process and analyze massive quantities of data at incredible speeds. Already, innovative enterprises are utilizing various AI tools and methodologies, such as web crawling, social media monitoring and digital analytics to anticipate emerging trends, deliver highly personalized customer services and boost productivity through finely tuned business operations. While it is undeniable that AI has…

Read More

Why banning TikTok will not solve data security challenges

Why banning TikTok will not solve data security challenges

TikTok, the social media platform owned by the Beijing-based company ByteDance, has come under fire from Washington, D.C. lawmakers. Legislation signed into effect on April 24 includes a provision that requires ByteDance to sell the social media app in the next nine to twelve months or be banned in the United States. According to the Associated Press, the ban would not go into effect for at least a year and will likely take longer due…

Read More

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

CISOs know best practice information security management comes down to people as much as technology. Without employees and a robust security culture on your side, tech deployment will not stop threat actors, who continue to find their way into organisations. It appears Asia-Pacific employees are not getting the message. Cyber security company Proofpoint recently surveyed 7,500 employees and 1,050 security professionals in 15 countries, including Australia, Japan, South Korea and Singapore. The company found that…

Read More

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The National Institute of Standards and Technology has updated its Cybersecurity Framework for 2024. Version 2.0 of the NIST CSF, the first major update since the framework was released a decade ago, was created with the goal of expanding the primary audience from critical infrastructure to all organizations. In general, the NIST CSF aims to standardize practices to ensure uniform protection of all U.S. cyber assets. TechRepublic’s cheat sheet about the NIST CSF is an…

Read More

Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

A new publication from Google’s Threat Analysis Group focuses on commercial surveillance vendors, whose services are bought by governments for monitoring or spying purposes. Google is currently tracking more than 40 CSVs, most of which are highly technical with the ability to develop spyware and zero-day exploits to compromise their targets, particularly on Android and iOS devices. Read details about what CSVs target, how spyware is used, CSVs’ harmful impact on individuals and society and…

Read More
1 2 3 4 8