Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends - but most are unware their risks that lie behind the blue light screens.The reality that many security experts may prefer to sweep under the rug. "The mobile edge is probably the most popular and growing attack vector for bad guys, more so than maybe any other edge device," he warned, sounding the alarm on a pervasive yet underestimated danger. Rewinding to the genesis of mobile ...
The Voice of Cyberยฎ
BUSINESS
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on ...
As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to ...
Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.
To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all ...
Boards need a robust risk management program and have to foster a cyber-aware culture throughout the organisation starting from the very top to help drive cyber maturity.
Recently, KBI.Media was included in the AUKUS Advanced Technology Dialogue here in Australia across Sydney and Canberra. Some of the dialogue is not allowed to be publicised, ...
In The News
Sort By
- Date
- Title
Cognizant has announced its Neuroยฎ AI Multi-Agent Accelerator and Multi-Agent Service Suite. These new offerings accelerate the development and adoption of AI agents, helping ...
Popular generative AI security analyst can now be used to speed cybersecurity investigations and simplify threat hunting across a growing list of native and third-party sources
CyberArkย (NASDAQ:ย CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a ...
Dragos and Yokogawa Electric have partnered to enhance industrial cybersecurity. By integrating Dragosโs OT cybersecurity platform with Yokogawaโs CENTUM VP system, the ...
With 2024 behind us, we saw another challenging year in the world of cybersecurity โ highlighted by new and evolving threats like Artificial Intelligence (AI)-driven phishing ...
Aristotle Metadata is thrilled to announce the appointment of Shad Sears as their new Chief Commercial Officer (CCO) and Chief Information Security Officer (CISO). Shad ...
Podcasts On BUSINESS