According to Gartner, by 2025, at least 45% of organizations globally will have experienced attacks on their software supply chain, a three-fold increase from 2021. Sunari Dandeniya of Commercial Bank of Ceylon emphasizes the need to actively monitor inventory and conduct regular risk assessments.
The cat-and-mouse game between cybercriminals and security solutions providers just escalated to the next level. With AI and machine learning being the new staple for enterprise applications, both cybercriminals and security researchers are exploring ways to leverage these technologies.
With his 90-day strategic planning, Tom Sweet, CIO and security head of Industrial Refrigeration Pros, managed to combine 300 distinct elements across four companies and implement a single ERP, mail systems, HRMS, and mobile device management in just three months.
Muath AlHomoud, CISO of Smart Digital Payment Company, in an interaction with Information Security Media Group, speaks about business challenges, cybersecurity landscape and privacy concerns facing the fintech industry in the Middle East region.
The proliferation of initial access brokers in the APAC region is having an impact on the underground ransomware market, and contributing to a rise in attacks, with the manufacturing sector being the primary target. These findings were revealed in a Group-IB annual report released in January 2023.
Ken Soh, who was primarily hired to manage the technology transformation and transition in the BH Group, grabbed an opportunity to lead Athena Dynamics - an entity providing cybersecurity advisory services to CISOs in Singapore and other countries in the region.
Holcim CISO Anbu David, along with his team, is conducting a series of cybersecurity awareness campaigns to ensure that people are aware about cyber hygiene.
Shaofei Huang of SMRT Corp. suggests a shift in the perception of cybersecurity from being solely technology-focused to a more comprehensive approach that incorporates both people and processes.
Andres Andreu, SVP and CISO of 2U Inc., talks about a methodical approach for analyzing the expanding attack surface. The podcast divulges how he has worked to protect the PII of users and the sensitive intellectual property of the institution from being compromised.
The Philippine Army continues to strengthen its cyber defense capabilities. Addressing the challenges of hybrid threats, the army’s signals battalion has embarked upon a "cyber for peace" mission, which is aligned with the UN to create awareness and assist organizations with better cyber hygiene.
Cybersecurity expert Jane Frankland believes lack of diversity is a major factor in a company's poor risk management. To address the shortage of skilled talent in the industry, hiring leaders must address the faulty processes and increase the recruitment and retention of women workforce.
The number of companies paying ransom has declined. This is primarily due to an advisory issued by OFAC in September 2021. The focus will now shift to mid-market companies this year, even as the larger companies get better at defending themselves, says Lou Steinberg, founder and managing partner at CTM Insights.
The role of a CISO has become increasingly complex and challenging. In some cases, a CISO may even need to act as a whistleblower if things go wrong. Whistleblowing has brought more visibility to CISOs, says Steve Zalewski, former CISO at Levi Strauss & Co.
Employment scams and new job phishing emails are rising amid the current tech layoffs in 2023. Dick Wilkinson, co-founder and chief technology officer, Proof Labs, advises job seekers to be mindful of the information they share with recruiters.
Digital forensics expert Lt. Col (Dr.) Santosh Khadsare (Retd.) believes digital forensics must be a fundamental part of an organization's cyber incident response plan. However, he highlights the necessity to address the shortage of standardization and skilled personnel in the field.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.