Contributed by Softchoice.Written by Abel E. Molina, Principal Architect, Security, Microsoft.As we look ahead to 2025, the landscape of cyber threats is evolving at a rapid pace, posing significant challenges for businesses, governments, and individuals. As the first blog of the year, I felt it appropriate to list the top 10 emerging cybersecurity threats of […]
Category Archives: Cloud Security Alliance
Category Added in a WPeMatico Campaign
Originally published by Illumio.For global e-commerce giant eBay, the cybersecurity stakes couldn’t be higher. It manages millions of transactions and customer interactions every day. The company’s success is built on buyers’ and sellers’ trust in its platform. This is why eBay turned to Illumio for microsegmentation. It wants to make sure potential breaches and ransomware […]
Originally published by Schellman.Written by Avani Desai, CEO, Schellman.Even as AI systems become more advanced and enmeshed in daily operations, concerns regarding whether large language models (LLMs) are generating accurate and true information remain paramount throughout the business landscape. Unfortunately, the potential for AI to generate false or misleading information—often referred to as AI “hallucinations”—is […]
Written by Jordi Vilanova, Cloudtango.In early 2024, T-Mobile experienced a significant data breach where attackers exploited weak IAM controls to gain access to the personal information of over 30 million customers. The attackers used a combination of phishing attacks and stolen credentials to bypass security measures. This incident led to sensitive data, including names, addresses, […]
Originally published by Vanta.Written by Jess Munday.If your business entails collecting and/or processing the personal data of European Union (EU) or United Kingdom (UK) citizens, complying with the General Data Protection Regulation (GDPR) is a priority.The regulation is quite comprehensive and includes numerous requirements your organization must implement. Adapting to its various requirements around transparency, […]
Written by Rajesh Awasthi, VP & Global Head of Managed Hosting and Cloud Services, Tata Communications.Originally published by DQ India.Cloud computing has transformed business operations with its scalability, flexibility, and cost-efficiency, encouraging organisations to modernise their IT infrastructure. According to Gartner’s, latest forecast, spending by end-users on public cloud services is expected to grow 20.4% […]
Originally published by Scrut Automation.Written by Nicholas Muy, Chief Information Security Officer, Scrut Automation.After suffering a devastating ransomware attack in early 2023, the law firm Mastagni Holstedt turned around and sued its Managed Service Provider (MSP), LanTech. While the legal case is still open, some important details from it illustrate key lessons for small and […]
Originally published by HCLTech.Written by Devkant Sharma, Group Manager, PMG Lead, Cybersecurity, HCLTech.In today’s increasingly digitized world, Operational Technology (OT) systems, which encompass the hardware and software that monitor and control physical devices, processes and events, are the lifeblood of O&G industry operations. These systems manage everything from exploration and production to refining and distribution, […]
We require a modern approach to accurately assess our use of current technology.This month marks 25 years since I managed my first cybersecurity attack. At the time, I was CTO for an internet service provider that suffered the compromise, which in those days was mostly script kiddies defacing webpages to show they had circumvented what […]
Written by Erick Tauil, Presales Engineer.Alright, let’s dive into a topic that often feels like a riddle wrapped in an enigma: Zero Trust. Communicating its concepts to non-security stakeholders can be quite frustrating and often met with a blank stare. After 15 years in cybersecurity, I’ve seen how a little confusion can derail even the […]