Call us Toll Free (USA): 1-833-844-9468     International: +1-603-280-4451 M-F 8am to 6pm EST

Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe

Protecting Human Rights in The Era of Cyber Information Warfare

By Edwin Weijdema, Global Technologist, Product Strategy at Veeam Disinformation is undermining the limitless potential of technology to be a positive force for industries, businesses and communities. In the current…

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on Protecting Human Rights in The Era of Cyber Information Warfare

Growth Strategies for China Must Prioritize WeChat Security

By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber China accounts for almost a quarter of global GDP, and its growing middle class has significant spending power. Across every industry,…

Posted in Uncategorized | Tagged , , , , , , , , | Comments Off on Growth Strategies for China Must Prioritize WeChat Security

4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Finding the right Systems and Organizations Controls (SOC 2) auditor for your organization By Patrick Murray, chief product officer, Tugboat Logic Given the heightened scrutiny and due diligence organizations place…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | Comments Off on 4 Matchmaking Tips to Find your Perfect SOC 2 Fit

Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news program. A cyber attack has hit the Australian Channel Nine’s live…

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on Hackers disrupted live broadcasts at Channel Nine. Is it a Russian retaliation?

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , , | Comments Off on The Best Network Protection: Go Deep or Go Broad?

CISA is warning of vulnerabilities in GE Power Management Devices

U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that could allow an attacker to conduct multiple malicious activities on vulnerable systems. U.S. Cybersecurity…

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on CISA is warning of vulnerabilities in GE Power Management Devices

13th Anniversary Global InfoSec Awards for 2025 now open for early bird packages! Winners Announced during RSAC 2025...

X