Tag: EN

A CISO game plan for cloud security

As businesses increasingly migrate to the cloud, chief information security officers (CISOs) face numerous critical challenges in ensuring robust cloud security. Don’t believe me? Experts highlighted this at the recent Gartner Security & Risk Management Summit. Gartner projects a significant…

Chinese Autonomous Driving Start-Up Files For HK Flotation

Start-up Minieye becomes latest mainland China autonomous driving firm to file for Hong Kong IPO in search for international investment This article has been indexed from Silicon UK Read the original article: Chinese Autonomous Driving Start-Up Files For HK Flotation

Hackers Weaponizing MSC Files In Targeted Attack Campaign

Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that enable them to perform different administrative tasks on the target system.  By mimicking legitimate files, MSC files can evade various…

Shhh. Did you hear that?

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> It’s Day One of EFF’s summer membership drive for internet freedom! Gather round the virtual campfire because I’ve got special treats and a story for you: New…

UK Retailers Sue Amazon For £1bn Claiming Data Misuse

Independent retailers sue Amazon for £1bn in biggest-ever UK retail case alleging company misused their data to launch rival products This article has been indexed from Silicon UK Read the original article: UK Retailers Sue Amazon For £1bn Claiming Data…

WeLiveSecurity wins Best Cybersecurity Vendor Blog award!

The award is an excellent opportunity for us to thank our readers and to recognize the depth of talent of ESET’s security researchers and writers This article has been indexed from WeLiveSecurity Read the original article: WeLiveSecurity wins Best Cybersecurity…

Cloud migration expands the CISO role yet again

The CISO role used to be focused primarily on information security — creating and implementing policies to safeguard an organization’s data and IT infrastructure from cybersecurity threats. However, as organizations rapidly migrate to cloud environments, the responsibilities and challenges for…