Diverse dangers: 8 recent cyber attacks
The sheer variety of attacks poses a major challenge worldwide
Read MoreThe sheer variety of attacks poses a major challenge worldwide
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreWith over two decades of experience in information security and cyber risk management across critical sectors, Watne explores the profound impact of the cyber domain on businesses and societies within a geo-political context.
Read MoreJoin Suresh Sankaran, Group Head of Cyber Security at Axiata Group, in this insightful podcast episode.
Read MoreExplore the potential risks and dangers of deepfake technology and provides insights on how to protect yourself from them.
Read MoreDr. Alissa J. Abdullah (Deputy CISO at Mastercard) thinks we’re looking at the cybersecurity skills shortage all wrong. We’ve got the talent – but we need to recruit and upskill employees in a different way.
Read MoreAre you (and all of your users) aware of emerging forms of cyber threat? We look at deepfakes, IoT botnets, quantum computing, and more.
Read MoreUnlock the secrets to a thriving career in cybersecurity with exclusive insights from industry titans. Learn from the best to become the best!
Read More