Be the Change: Leveraging AI to Fast Track Next-GenCyber Defenders; Diwakar Dayal, SentinelOne

Diwakar Dayal, MD and Country Manager at SentinelOne Cybersecurity is among the top things keeping CISOs up at night. To keep their infrastructure and data safe, security teams have to manage an ever-growing number of data sources on the scale of petabytes. While the know-how to protect these assets exist, the lack of skilled talent…

Read More

Asia/Pacific* Security Spending to Grow 12.3% in 2024; IDC

IDC’s latest Worldwide Semiannual Security Spending Guide According to IDC’s latest Worldwide Semiannual Security Spending Guide, spending on security hardware, services, and software in Asia/Pacific excluding Japan (APeJ) is expected to reach $36 billion in 2024, an increase of 12.3% over the previous year. With the evolving threat landscape and increasing complexities, organizations in the region are…

Read More

IIT Kanpur, C3iHub, Launches Start-Up Cohorts Specialising In Specific Cybersecurity Areas

  C3iHub, a National Technology Innovation Hub (TIH) for Advanced Cybersecurity at the Indian Institute of Technology Kanpur (IITK), launched start-up cohorts III, IV, and V at the Hyatt Regency, New Delhi. Funded by the Department of Science and Technology (DST) under the NM-ICPS Mission, C3iHub presented 19 start-ups in the Start-up Incubation Program, specialising in specific…

Read More

HHS Plans for Cyber ‘One-Stop Shop’ After United Healthcare Attack

The Department of Health and Human Services (HHS) has begun an initiative to better organize and equip its healthcare cyber security programs through a one-stop shop. This latest resource is created through the HHS Administration for Strategic Preparedness and Response (ASPR), which leads the US during disasters and public health emergencies relating to health and…

Read More

Alert: Hackers Hit High-Risk Individuals’ Personal Accounts

Calling all high-risk individuals: Ensure you’re taking adequate steps to secure your personal devices and accounts against hacking, tampering and other types of interference. Britain’s National Cyber Security Center is warning that criminals and nation-state hacking groups, confronted with well-managed corporate cybersecurity defenses, have turned their sights to individual personal devices and accounts. “In recent years there…

Read More

BD Soft & Cyral Collaborate to Safeguard Cloud Data in Indian Markets

BD Software Distribution Pvt. Ltd. (BD Soft), a leading Value-Added Distributor (VAD) of Cyber Security solutions, join hands with Cyral, a platform helping enterprises to secure & govern their data in the cloud. This collaboration aims to reduce the risk, complexity, and costs associated with managing structured data, catering to the increasing demands of Indian…

Read More

Pranava Adduri, CEO & Co-Founder, Underlines Importance of Frictionless Data Security

Bedrock Security, the frictionless data security company,  unveiled its comprehensive data security platform. Empowering organizations to effectively manage data risk introduced by cloud and generative AI (GenAI), Bedrock continuously discovers, manages, and protects sensitive data. Bedrock Security Unveils the Industry’s First Frictionless Data Security Platform, Announces $10 Million in Seed Funding Pranava Adduri, CEO &…

Read More

Regulation Remains the Strongest Multiplier to Cybersecurity Growth; Frost & Sullivan

Newly released report ahead of GISEC Global 2024 offers deep dive into current conditions of the region’s cyber security industry In 2023, the United Arab Emirates (UAE) actively repelled more than 50,000 cyberattacks daily, according to the UAE Cybersecurity Council. In the first three quarters of the same year, the country successfully prevented over 71…

Read More

Cybercriminals Transform Raspberry Pi Into A Tool For Fraud & Anonymization: GEOBOX Discovery

  Resecurity identified a new solution advertised on the Dark Web – GEOBOX, a custom software, purpose-built for Raspberry Pi devices, representing an evolution in tooling for fraud and anonymization. Notably, the cybercriminals transformed widely used geek-favorite device into a ‘plug-and-play’ weapon for digital deception – enabling the operator to spoof GPS locations, emulate specific…

Read More

CISA Releases Guidance For Critical Infrastructure To Defend Against Chinese Hacking Group

CISA Releases Guidance For Critical Infrastructure To Defend Against Chinese Hacking Group CISA, along with several other U.S. authorities including the NSA, FBI and global partner Five Eyes cyber security agencies have warned critical infrastructure leaders to protect their systems against the Chinese Volt Typhoon hacking group. Volt Typhoon (also known as Vanguard Panda, Brronze…

Read More