DTA creates ongoing CIO role – Strategy – Training & Development
The Digital Transformation Agency (DTA) has made a move to recruit a permanent chief information officer, after bringing in a CIO on a non-ongoing basis…
The Digital Transformation Agency (DTA) has made a move to recruit a permanent chief information officer, after bringing in a CIO on a non-ongoing basis…
The Qilin ransomware group has been using a new tactic and deploys a custom stealer to steal account credentials stored in Google Chrome browser. The credential-harvesting…
As organizations face an escalating wave of cyberattacks, ransomware remains a top concern, with more than 91% of IT and security decision-makers admitting to having…
In today’s fast-paced digital world, data breaches have become the norm, not the exception. With data sprawled across cloud, on-prem, and hybrid environments, organizations face…
INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing campaign to invest in the…
Mike Lynch, the tech tycoon who died when his luxury yacht sank off Sicily, spent more than a decade building Britain’s biggest software company and…
The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in data protection. According to MIT…
The rapid adoption of cloud technology has led to an explosion in complexity and vulnerability within modern infrastructures. In 2022, 45% of businesses reported cloud-based…
Google and Australia’s national science agency CSIRO will join hands to develop digital tools that automatically detect and fix software vulnerabilities for operators of critical…
The rapid adoption of AI and Generative AI applications has unlocked tremendous potential, but it has also introduced significant security risks that enterprises must address.…
The cyber criminal Qilin ransomware gang seems to be upping the stakes in its ransomware attacks, stealing not just their victims’ data, but harvesting credentials…
U.S. CISA adds Dahua IP Camera, Linux Kernel and Microsoft Exchange Server bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini August 22, 2024 U.S.…