‘Dark Web is Reshaping Cybersecurity Landscape & its a Staggering Growth’: Shawn Loveland

Unprecedented growth of ‘Dark Web’ market has been a major concern for governments & corporate organizations worldwide. The leakage of massive volumes of stolen PII data from Thailand in ‘Dark Web’ is a very recent example of its growing strength. We at ‘www.digitalcio.in’ & ‘www.securitydive.in’, recently interviewed Shawn Loveland, COO, Resecurity, US based cyber security…

Read More

Role of ‘Wazuh’ in Governance of Organizational Cyber secure Framework

Open Source Software (OSS) “Wazuh” Cyber security architecture refers to the design and framework governing an organization’s approach to securing information systems. It outlines the components, policies, technologies, and processes to protect digital assets. The primary objective of a cyber security architecture is to establish a robust, resilient, and well-integrated defense against a wide range…

Read More

German Software SAP Plans Restructuring to boost AI development

German software giant SAP is launching a major reorganization of its artificial intelligence (AI) business, with around 8,000 employees affected by the plan, the company announced late on Tuesday. “With the planned transformation programme, we are increasingly shifting investments to strategic growth areas, primarily AI,” said SAP chief executive Christian Klein. “This will allow us to…

Read More

CybeReady Offers Practical Guide to Protect Data Privacy

Corporate Data Privacy Training Toolkit by CybeReady CybeReady,  unveiled its Data Privacy CISO Toolkit to highlight Data Privacy Week. This training toolkit for CISOs incorporates current data privacy trends, is free to download from the CybeReady website and aims to bolster data privacy training initiatives. Started in the United States and Canada in January 2008 by…

Read More

Ransomware Main Cause for Business Outages; Veeam Data Protection Report 2024

Veeam recently released insights from the company’s 5th annual Veeam Data Protection Trends Report 2024 While companies say they will spend more trying to fend off cyber-attacks, the survey found IT leaders are feeling even less protected and more concerned about their ability to recover and restore mission-critical data. Respondents shared that cyber-attacks remain the…

Read More

COE of Cyber security of Karnataka Launches ‘Browse Safe’, to Protect From Cyber frauds

Karnataka state launched a security net initiative to safeguard people from all kinds of cyber frauds. The State’s Centre of Excellence for Cyber Security introduced ‘Browse Safe’, a free-to-use online safety service on Saturday to ensure digital safety for citizens. ‘Browse Safe’ is a public Domain Name System (DNS), a first-of-its-kind initiative in the country,…

Read More

Sternum Announced Enhanced Security for the ChargePoint Home Flex.

Sternum, the pioneer in embedded IoT security and observability, today announced enhanced security for the ChargePoint Home Flex. In a comprehensive research project, Sternum identified a potential vulnerability involving the reverse SSH tunnel and deprecated NTP client and HTTP servers. ChargePoint, with its last firmware update, has disabled the HTTP server and updated the NTP…

Read More

Automated Breach And Attack Simulation – Can You Deny It’s Relevance?

Traditional security measures today expose your organization to various cyber threats, which come with lethal attacking policy and techniques. Hence automated BAS solution must be a crucial component of your core security policy and measurements. In the wake of New Year 2024, the first week of January saw a fatal cyber attack by “Meow” ransomware…

Read More