Why CIOs need to revisit desktop virtualisation
20
Feb
2023

Why CIOs need to revisit desktop virtualisation

Desktop virtualisation is not a new concept, but IGEL, which recently moved out of the hardware business, is now partnering…

Coinbase cyberattack targeted employees with fake SMS alert
20
Feb
2023

Coinbase cyberattack targeted employees with fake SMS alert

Coinbase cryptocurrency exchange platform has disclosed that an unknown threat actor stole the login credentials of one of its employees…

AI-enhanced Defense Against Ransomware Within the Organization’s Architecture
20
Feb
2023

AI-enhanced Defense Against Ransomware Within the Organization’s Architecture

Abstract: Ransomware is a type of revenue-generating tactic that cybercriminals utilize to improve their income. Businesses have spent billions of…

20
Feb
2023

Why people-driven remediation is the key to strong API security

If an organization relies on automation and tools to highlight API security issues, it is still up to a trained…

Malware analysis
20
Feb
2023

How to Detect New Threats via Suspicious Activities

Unknown malware presents a significant cybersecurity threat and can cause serious damage to organizations and individuals alike. When left undetected,…

RailYatri Data Breach
20
Feb
2023

RailYatri Data Breach 2023; Stolen Data Leaked on Dark Web

The cybersecurity posture of Indian Railways is under scrutiny again, with the latest breach at the e-booking services website RailYatri….

20
Feb
2023

Meet the Health Finalists in the 2023 iTnews Benchmark Awards – Benchmarking Change

The finalists for the iTnews Benchmark Awards Best Health Project demonstrate the essential role of information technology in improving the…

20
Feb
2023

Four steps SMBs can take to close SaaS security gaps

Despite economic volatility and tighter budgets, adoption of software as a service (SaaS) continues to increase. Gartner forecasts a 16.8%…

20
Feb
2023

Have You Heard About The TikTok Car Theft Challenge 2023?

TikTok’s meteoric rise to fame has made it a cultural phenomenon, with over 500 million active users consuming content on…

20
Feb
2023

Microsoft limits Bing chats to five questions per session – Strategy

Microsoft will limit chat sessions on its new Bing search engine powered by generative artificial intelligence (AI) to five questions…

20
Feb
2023

Cybersecurity takes a leap forward with AI tools and techniques

Scientists have taken a key step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL,…

Accreditation key to enterprise security
20
Feb
2023

Accreditation key to enterprise security

In July 2021, joint research from Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) found the area…