Category: Security

  • Busting Three Data Protection Myths

    Busting Three Data Protection Myths

    By: Mohamad Rizk While once upon a time, it may have been an afterthought, data protection is now an everyday priority for businesses. Beyond regulations like GDPR and the soon-to-arrive NIS2, the average global cost of a data breach is $4.45M. The financial impact can be even worse if production data is compromised – either…

    Read More

    //

  • Building Resilience: Why Disaster Recovery is the Backbone of IT Infrastructure

    Building Resilience: Why Disaster Recovery is the Backbone of IT Infrastructure

    By: Harikrishna Prabhu Data resilience is a critical element for ensuring the uninterrupted flow of operations. With businesses relying heavily on data for decision-making, customer engagement, and overall functionality, the importance of robust data management through managed database services cannot be overstated. Having a solid plan to bounce back from disasters is non-negotiable, as businesses…

    Read More

    //

  • Olympics will Increase Exposure to Cyberthreats

    Olympics will Increase Exposure to Cyberthreats

    By: Bashar Bashaireh The Paris 2024 Summer Olympic Games gets underway on July 26 this year. Securing the IT architecture of the Olympic Games is no easy matter. It is complex, built on a cloud-native approach with several hundred interconnected applications. In terms of volume, billions of items of data will be transiting via the…

    Read More

    //

  • Meta’s “Pay or Consent” Model Deemed Unfair by EU Commission

    Meta’s “Pay or Consent” Model Deemed Unfair by EU Commission

    The European Commission has ruled that Meta’s “pay or consent” model violates EU competition rules and data protection principles. The model, which forces users to either pay for an ad-free experience or consent to extensive data tracking, has been criticized for lacking transparency and exploiting Meta’s dominant market position. Consumer groups argue that this approach…

    Read More

    //

  • BEL signed a contract valued at Rs.3,172 Crs with Armoured Vehicles Nigam Limited

    BEL signed a contract valued at Rs.3,172 Crs with Armoured Vehicles Nigam Limited

    Navratna Defence Public Sector Undertaking, Bharat Electronics Limited (BEL), has bagged an order of Rs.3,172 Crs from Armoured Vehicles Nigam Limited (AVNL) on June 28, 2024, at AVNL Headquarters in Chennai. The project entails the supply and installation of an advanced, indigenously designed and developed Sighting and Fire Control System (FCS) for the upgrade of…

    Read More

    //

  • Organizations Struggle with Outdated Security Approaches: Report

    Organizations Struggle with Outdated Security Approaches: Report

    Cloudflare, Inc published its State of Application Security 2024 Report. Findings from this year’s report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in…

    Read More

    //

  • Harnessing Collective Defense with Intelligence Sharing and Continuous Threat Exposure Management

    Harnessing Collective Defense with Intelligence Sharing and Continuous Threat Exposure Management

    By: Prashant G J As technology advances, cybercriminals continually refine their methods, creating an ever-evolving challenge for security professionals. Traditional cybersecurity measures often fall short, unable to keep pace with modern cyber threats’ sophistication and speed. This has prompted the rise of Continuous Threat Exposure Management (CTEM) and Collaborative Defense Strategies, where organizations proactively share…

    Read More

    //

  • Understanding the hidden Risk of unsecured usage of GenAI at work as Prompt Security gets seed fund

    Understanding the hidden Risk of unsecured usage of GenAI at work as Prompt Security gets seed fund

    In the rapidly evolving world of artificial intelligence, generative AI (Genoa) tools have become indispensable for many enterprises, enhancing productivity and streamlining operations. However, a growing concern among cybersecurity experts is the potential for data leaks when employees use unsecured GenAI solutions. Prompt Security, a company dedicated to making GenAI safe for enterprises, has highlighted…

    Read More

    //

  • Spyware found on US hotel check-in computers leaks guest info Online

    Spyware found on US hotel check-in computers leaks guest info Online

    According to reports, a troubling security breach involving spyware on the check-in systems of several Wyndham hotels across the United States has surfaced. The spyware, a consumer-grade app called pcTattletale, has been clandestinely capturing screenshots of guest information and leaking them onto the internet due to a security flaw. The Discovery Security researcher Eric Daigle…

    Read More

    //

  • Don’t Let Your AI Turn Against You: Elastic’s Essential Guide to LLM Security

    The LLM security spotlight is on, fueled by the rapid adoption of Generative AI. Organizations must adopt best practices now to stay ahead of the curve. Elastic, a Search AI company, announced LLM Safety Assessment: The Definitive Guide on Avoiding Risk and Abuses, the latest research issued by Elastic Security Labs. The LLM Safety Assessment…

    Read More

    //