Friday, July 26, 2024
Home Guest Author

Guest Author

2024 Halfway Point Trends in Cybersecurity

2024 Halfway Point Trends in Cybersecurity

Alan Sanchez, CISO EMEA at Fortinet, discusses insights and strategies on navigating the cyber security landscape in the current climate and how new technologies...
AI - Weapon of Attack or Security?

AI – Weapon of Attack or Security?

Artificial intelligence plays a massive role in protecting data networks, but it is also key in cybersecurity attacks. How do organizations stay secure amid...
Security in The Time of AI

Security in The Time of AI

As security risks rise, AI has a key role to play there to help identify threats instantly and reduce downtime. AI can do things...
The Password Mistakes Every Business Makes and How To Fix Them

The Password Mistakes Every Business Makes and How To Fix Them

In today's digital landscape, passwords serve as the first line of defense for businesses against cyber threats. Following news that common and easily guessed are being...
How to Protect Data in the Cloud

How to Protect Data in the Cloud

It's never been more important for businesses to be aware of how to secure data stored in the cloud. To mark this year's World...
How business security, data protection, and your bottom line benefit from ISO 27001

How business security, data protection, and your bottom line benefit from...

Modern companies collect and manage vast amounts of data, which can expose them to severe business hazards without adequate security and protection measures. Cyber threats...
Unveiling-2023's-Top-Security-Concerns-for-Businesses-and-Consumers

Unveiling 2023’s Top Security Concerns for Businesses and Consumers

Cyber security is in an interesting spot at present. On one hand, we've never had so many cyber security tools available that can prevent...
threat actors

Expect AI to be a tool and a target for threat...

It’s been another 12 months full of incident in cybersecurity. But for business and IT leaders, the hard work never stops, says Bharat Mistry,...

400% Growth in IoT Malware Attacks: Where Organizations are Lacking Robust...

IoT (Internet of Things) and OT (Operational Technology) have transformed how IT teams interact with devices via the Internet. While offering efficiency, insights, and...
How cyber skills shortages are leaving businesses vulnerable post-attack

How cyber skills shortages are leaving businesses vulnerable post-attack

Cyber security is as different as night and day from what it was a few years ago. From artificial intelligence and machine learning to behavioral...

Latest posts