Top 5 Cyber Security Trends for 2025

Top 5 Cyber Security Trends for 2025

The cyber landscape is more turbulent than ever. Microsoft recently reported a 2.75-fold increase in ransomware attempts this year, while research predicts that global cyber attacks in 2024 will surge 105% compared to 2020. There is a dire need for more qualified cyber professionals as generative AI is lowering the barrier to entry for attacks. Unfortunately, cyber skills gaps have been reported in both the U.K. and Australia, with women making up only a quarter…

Read More

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks, Supermarkets Targeted in Ransomware Attack

Starbucks and several major U.K. supermarkets experienced disruption due to a ransomware attack on the prominent supply chain software provider Blue Yonder. The company disclosed the incident on Thursday, Nov. 21, and it was still working to restore services the following Monday. The disruption to the Blue Yonder platform prevented Starbucks from paying its baristas and managing their schedules, according to the Wall Street Journal. As a result, cafe managers had to manually calculate their…

Read More

Supply chain security: A key career skill

Supply chain security: A key career skill

In previous articles we have discussed the fact that supply chain security was sometimes part of the corporate security function but at times was a separate activity setting under operations or production. Whatever the organization structure, having a deep understanding of supply chain security risks is highly beneficial for your career today more than ever. Organizational supply chain risks are influenced by a mix of geopolitical tensions, evolving technology and broader economic shifts. It is…

Read More

Combating cyber threats with zero trust and supply chain security

Combating cyber threats with zero trust and supply chain security

The cyber threat landscape is growing more complex and challenging to contend with, exacerbated by advancements in artificial intelligence and increasingly sophisticated cyber criminals. The volume and severity of attacks are increasing in tandem; Keeper Security’s 2024 Insight Report revealed that 92% of IT security leaders have seen an increase in cyber attacks year-over-year.  Among the most pervasive threats to enterprises today are software supply chain attacks. The 2024 Verizon Data Breach Investigations Report revealed…

Read More

Supply chain cybersecurity and modern-day cargo theft

Supply chain cybersecurity and modern-day cargo theft

In 2024 alone, $700+ million worth of cargo shipments were stolen. Modern heists bear little resemblance to the dramatized versions on shows like The Sopranos or Goodfellas. Today’s hijackers don’t need guns or elaborate schemes; all they require are login credentials to access billions of dollars in global shipments. While technology has revolutionized global logistics and helped meet growing customer expectations, it can also make shippers and manufacturers more vulnerable to losing massive amounts of…

Read More

Ava Turner Leone | Women in Security 2024

Ava Turner Leone | Women in Security 2024

Thriving in security When Ava Turner Leone first entered the workforce as an officer manager for an import customs brokerage firm, she couldn’t have imagined where her career would take her over the next 26 years. “Early on my career really was happenstance, it was completely kind of unplanned in terms of what direction that I was going, I didn’t know what I wanted to do or where I was headed,” Turner Leone says. Her…

Read More

How Can Businesses Defend Themselves Against Cyberthreats?

How Can Businesses Defend Themselves Against Cyberthreats?

Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data being moved onto online systems capable of exploitation, thus increasing the profitability of a successful breach. Furthermore, launching a cyberattack is becoming more accessible. Exploit kits and malware-as-a-service offerings are getting cheaper, while open-source AI tools are making masquerading as a trusted executive and exploiting vulnerabilities easier. TechRepublic consolidated expert advice…

Read More

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

The business-to-business market will see a number of big changes in the years to 2030, according to a new report from customer experience firm Merkle. APAC regional B2B enterprises will need to consider their levels of investment in a number of technologies and integrating new tools now to prepare for and adapt to the coming changes. The B2B Futures: The View From 2030 report argues four key “seismic” trends are coming to B2B: A rise…

Read More

Council Gives Green Light to Europe’s Corporate Sustainability Due Diligence Directive

Council Gives Green Light to Europe’s Corporate Sustainability Due Diligence Directive

A Major Step Forward for Global Business Ethics Alignment For most businesses, corporate responsibility has evolved from a peripheral concern to a core consideration. And today, with the Council’s vote on the European Union (EU) Corporate Sustainability Due Diligence Directive (CSDDD), the EU took a significant step toward ensuring that businesses respect human rights, protect the environment, uphold ethical standards, and report on their efforts to do so. Cisco’s long-standing commitment to corporate accountability Upholding…

Read More

Better software supply chain security through SBOMs

Better software supply chain security through SBOMs

An executive order from President Biden in 2021 focused on enhancing software supply chain security. This added transparency can help to identify and mitigate security risks, such as vulnerabilities in open source components or malicious code that has been inserted into the supply chain. These Software Bills of Materials (SBOMs) play an important role in enhancing software supply chain security by providing transparency into the components used to build software. This requirement is designed to…

Read More
1 2 3 10