Cybersecurity

Apple MacBook beside computer mouse on table

Data breaches cutting like a razor blade? Here are 4 ways to protect your business

To effectively navigate the complexities of managing cybersecurity in today's business landscape, most companies must first prioritize awareness and training. Establishing a robust security culture is paramount, not only to safeguard their own interests but also to protect their customers' data from internal and external threats.

WISe.ART AG receives strategic funding from The Hashgraph Association to accelerate trusted NFT adoption

WISe.ART AG, a subsidiary of Switzerland-based cybersecurity firm WISeKey, said Monday it has received strategic funding from The Hashgraph Association (THA). This funding will be used to accelerate the broad adoption of the Hedera network and advance the integration of trusted non-fungible tokens (NFTs) through the WISe.ART platform.

MIniature Toy Robot on Top of Laptop's Keyboard

The unwanted guests: How e-commerce platforms can elevate their cybersecurity posture against the growing threats of bots

The prevalence of #bot attacks in the #ecommerce industry poses a significant threat to #enterprises, with potential costs reaching up to millions of dollars. By implementing comprehensive #cybersecurity practices and strategies, e-commerce platforms can enhance their security posture, protect their customers, and establish themselves as trusted and secure…

Indian cyber security startup PingSafe launches from Stealth with $3.3M to outsmart attackers

PingSafe, an India-based cloud-native application protection platform (CNAPP) platform powered by attacker intelligence, has on Thursday announced its emergence from stealth mode with $3.3 million in seed funding. The funding round was led by Sequoia Capital India & Southeast Asia's (now known as Peak XV Partners) Surge.

Cybersecurity funding falls 63 percent in second quarter, says Crunchbase

Venture funding for cybersecurity dropped to just slightly more than $1.6 billion in the just completed second quarter — a 63 percent drop from the same quarter last year when startups saw nearly $4.3 billion, Crunchbase said on Tuesday.

Malaysia to take action against Facebook’s parent Meta over harmful contents

As there is no sufficient cooperation from Meta, MCMC said it has no option but to take definitive steps or legal action against Meta as a measure to ensure that people are secure and protected in the digital sphere. The agency said such action is necessary in promoting accountability for cybersecurity and enhancing consumer protection against online harms,…

Software Engineer Standing Beside Server Racks

The tragedy of the data commons: Why new strategies are needed to bring harmony to IT

#Data, much like drinking water, is a critical resource. Developers need to use this data, and logically, they want to use it as much as possible as it enables them to build innovative applications and products. However, too much data flowing around a modern distributed #enterprise environment carries risks to the larger company.

Focused young Asian woman in casual wear writing with stylus on tablet and browsing laptop while working remotely at home with children

Without secured remote connectivity, most enterprises aren’t fully ready to tackle IT challenges hybrid work brings

While hybrid work is already largely considered normal, the report makes it clear that modern platforms are better at coping with the demands and challenges around user support in tandem with the current realities of #IT talent supply. While a remote connectivity platform can represent a transformative solution, I believe it is also a necessity for…

Person choosing document in folder

Netskope’s Colin Estep on managing cybersecurity risks amid “Great Resignation” [Q&A]

"Departing employees are not the only ones posing a risk. Virtually any employee can exfiltrate #data, whether inadvertently or on purpose. It would be a mistake for organizations to focus their attention on specific cohorts of employees, ignoring the broader risk of easy data exfiltration over ubiquitous cloud-based services. Our research showed most of…

Hand Holding a USB Flash Drive

As Web2 giants enter the Web3 space, security will be make-or-break

It is not a question of if, but when and how mass adoption of blockchain technologies will take place. Asset security will be vital to driving wide-scale adoption with confidence.