Threat Intelligence & Prevention

Why Did Illumina Pay $9.8M for Cybersecurity Failures?
Malware & Threats Why Did Illumina Pay $9.8M for Cybersecurity Failures?

In a striking reminder of the high stakes involved in government contracts, a San Diego-based biotech giant, Illumina Inc., recently settled with the U.S. Department of Justice for a staggering $9.8 million over allegations of cybersecurity lapses. This case, centered on the sale of genomic

Continuous Threat Exposure vs. Vulnerability Management: A Comparative Analysis
Identity & Access Management Continuous Threat Exposure vs. Vulnerability Management: A Comparative Analysis

In an era where the frequency and sophistication of cyberattacks are surging, organizations worldwide continually seek robust frameworks to secure their digital landscapes. Amid this pressing need, Continuous Threat Exposure (CTE) and Vulnerability Management (VM) have emerged as pivotal components

How Can Businesses Tackle Ransomware with Legacy Systems?
Identity & Access Management How Can Businesses Tackle Ransomware with Legacy Systems?

In recent times, the rise in ransomware attacks has mounted significant pressure on businesses worldwide, especially those heavily relying on legacy systems. Notable incidents at major retailers like Marks & Spencer and the Co-op have spotlighted the vulnerabilities these older infrastructures

How Is Agentic AI Transforming Security Operations Centers?
Endpoint & Device Security How Is Agentic AI Transforming Security Operations Centers?

Security Operations Centers (SOCs) have reached a critical juncture, where the convergence of escalating cyber threats and the constraints of existing resources demand innovative solutions. As organizations grapple with the complexity of modern cybersecurity, agentic AI is emerging as a game

AI Bots Drive Rise in Fraudulent Customer Signups
Identity & Access Management AI Bots Drive Rise in Fraudulent Customer Signups

In a world where cybersecurity threats are evolving at an unprecedented pace, understanding and mitigating risks such as signup fraud is crucial. Rupert Marais, an expert in endpoint and device security, is here to shed light on the complex dynamics of this issue and how innovative strategies can

Geopolitical Forces Redefine Global Cyber Warfare Strategies
Endpoint & Device Security Geopolitical Forces Redefine Global Cyber Warfare Strategies

The intricate relationship between geopolitical tensions and cyber warfare has steadily intensified, placing cyberattacks at the forefront of global security concerns. Nation-state-backed actors have elevated digital offensives, matching the scale and intensity of a physical conflict. As cyber

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later