Latest HID State of Security and Identity Report reveals shift toward software-driven solutions, platformization and AI. As organizations navigate an increasingly complex threat landscape, security ...
Taking Singapore as an example, this writer’s strategies are applicable to organizations in other smart nation landscapes amid heightened cyber vulnerabilities With workforces increasingly distributed ...
Based on a November 2024 survey of 400 IT security decision makers* by a cybersecurity firm on the topic of AI in cybersecurity (particular generative AI), some findings have been published. First, 65 ...
One identity security firm has some disturbing 2024 data, and their solution is: rapid preemptive defenses that can intercept novel attacks Based on what is described as “live observations of criminal ...
The world must avoid the “gold rush” mentality that clouds stakeholders from ethical and sustainability concerns that demand responsibility and accountability The global IT industry is experiencing an ...
To establish its first in-country security operations center (SOC) on public cloud in Malaysia, an IT infrastructure services provider has a mission to enable enterprises across the country to keep ...
Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam Center with HID facial recognition system. Batam Center is one of the most-trafficked border ...
Many small businesses in India underestimate cyber risks and downplay the damage that could be incurred: a mindset that needs correction Many small business owners in India believe that cybersecurity ...
An advanced persistent threat group linked to China has been injecting persistent backdoors in end-of-life routers after gaining root access Threat researchers have released findings showing that a ...
Check Point and Zoom have collaborated to fix the Vanity URL issue. Check Point and Zoom have recently liaised to resolve a security issue recently found which may lead to phishing attempts. This ...
The growing prevalence of AI in both cyber-attacks and defenses has made these AI-powered technologies both a challenge and an opportunity for the CISO. The cost of leveraging AI for cyber-attacks can ...
One unmentionable fact is that some patches/updates can be so disruptive and/or buggy that users will face challenges installing them all! This week’s Patch Tuesday (March 2025) from Microsoft has ...