<
>
Home » News » Daily News
Automate Cybersecurity in a “Harmonic” Way

Kicking off the Cortex Symphony 2021, the host of this exclusive Palo Alto Networks virtual event, Filmmaker, Actor, Comedian, Comic Book Writer, Author &...

Threat-Centric Approaches No Longer Enough, Companies Need to Adopt an Access-Centric Cybersecurity Strategy

For so long, organisations have been used to negotiating their security landscape in a reactive way. Meaning, they tend to focus on addressing threats or...

Major US Firm Shuts Down 5,500 Miles of Its Pipeline Due to Ransomware Attack – Hear What the Experts Say

Colonial Pipeline, the largest refined products pipeline in the United States, became the victim of a devastating cyber attack on Friday. The company has...

Some Apps Are Lying About Privacy – Black Hat Asia 2021

With the current pandemic situation, where people are compelled to do the majority of their activities online, from work to live and play, mobile applications...

Going Back to the Basics of Information Security to Combat Supply Chain Attacks – Black Hat Asia 2021

For the last keynote session of this year’s Black Hat Asia, information security experts participated in a panel discussion regarding the most pressing...

Surveillance Is Affecting the Interests of Potential Security Experts – Black Hat Asia 2021

The demand for cybersecurity experts is thriving, especially in today’s digital landscape where threats actors are utilising more and more advanced...

Black Hat Asia 2021: Are We Leaking Data Without Knowing it?

Black Hat Asia 2021 kicked off with an interesting opening keynote presentation by Troy Hunt, a security researcher and founder of “Have I Been...

World Password Day – Are Our Passwords Strong Enough to Keep Hackers in the Shadows?

Every year on the first Thursday of May, we celebrate World Password Day – an important reminder to ensure that we are doing all we can to manage and...

Microsoft Security Research Group Discovers 25 Security Flaws in IoT And OT Devices

The interconnectivity of Internet of Things (IoT) devices as well as those in the Operational Technology (OT) environments has given organisations new...

Closing the Pandora’s Inbox: How Greek Mythology Connects with Cybersecurity

There are many life lessons that can be learned from Greek mythology, but can the same be said for cybersecurity? Short answer, yes!   This is what...

Pages