Cybersecurity

Telstra International strengthens global managed cyber security services with new center in Manila

Telstra International, the global arm of leading telecommunications and technology company Telstra, has on Thursday opened the doors to its new Telstra Security Service Centre (TSSC) in Manila, Philippines, to enhance its capabilities and coverage of managed cyber security services for its customers globally.

selective focus photography of graph

Web application security, the sentinel of BFSI’s digital transformation

As the #BFSI sector continues its #DigitalTransformation journey, safeguarding customer and business data through robust web application security is not an option but a necessity. In a world where cyber threats are constantly evolving, BFSI organizations must adopt proactive #CyberSecurity measures, including the people, process, and technology…

Becoming unstoppable against ransomware

Our Rubrik’s Zero Labs Report found that over the last year, 66 percent of organizations in Singapore have experienced between 1-25 attempted #cyberattacks. While it is impossible to prevent all attacks, organizations can take steps to minimize the impact of a #databreach. This includes having a solid #datasecurity strategy in place and being prepared to…

Apple MacBook beside computer mouse on table

Data breaches cutting like a razor blade? Here are 4 ways to protect your business

To effectively navigate the complexities of managing cybersecurity in today's business landscape, most companies must first prioritize awareness and training. Establishing a robust security culture is paramount, not only to safeguard their own interests but also to protect their customers' data from internal and external threats.

WISe.ART AG receives strategic funding from The Hashgraph Association to accelerate trusted NFT adoption

WISe.ART AG, a subsidiary of Switzerland-based cybersecurity firm WISeKey, said Monday it has received strategic funding from The Hashgraph Association (THA). This funding will be used to accelerate the broad adoption of the Hedera network and advance the integration of trusted non-fungible tokens (NFTs) through the WISe.ART platform.

MIniature Toy Robot on Top of Laptop's Keyboard

The unwanted guests: How e-commerce platforms can elevate their cybersecurity posture against the growing threats of bots

The prevalence of #bot attacks in the #ecommerce industry poses a significant threat to #enterprises, with potential costs reaching up to millions of dollars. By implementing comprehensive #cybersecurity practices and strategies, e-commerce platforms can enhance their security posture, protect their customers, and establish themselves as trusted and secure…

Indian cyber security startup PingSafe launches from Stealth with $3.3M to outsmart attackers

PingSafe, an India-based cloud-native application protection platform (CNAPP) platform powered by attacker intelligence, has on Thursday announced its emergence from stealth mode with $3.3 million in seed funding. The funding round was led by Sequoia Capital India & Southeast Asia's (now known as Peak XV Partners) Surge.

Cybersecurity funding falls 63 percent in second quarter, says Crunchbase

Venture funding for cybersecurity dropped to just slightly more than $1.6 billion in the just completed second quarter — a 63 percent drop from the same quarter last year when startups saw nearly $4.3 billion, Crunchbase said on Tuesday.

Malaysia to take action against Facebook’s parent Meta over harmful contents

As there is no sufficient cooperation from Meta, MCMC said it has no option but to take definitive steps or legal action against Meta as a measure to ensure that people are secure and protected in the digital sphere. The agency said such action is necessary in promoting accountability for cybersecurity and enhancing consumer protection against online harms,…

Software Engineer Standing Beside Server Racks

The tragedy of the data commons: Why new strategies are needed to bring harmony to IT

#Data, much like drinking water, is a critical resource. Developers need to use this data, and logically, they want to use it as much as possible as it enables them to build innovative applications and products. However, too much data flowing around a modern distributed #enterprise environment carries risks to the larger company.