Introduction
In todayโs digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially. ย
As creating and sharing documents from anywhere continue to evolve, making reliable and secure communication has become all the more challenging. Content and document security are pivotal in protecting business continuity and intellectual property, as well as building citizen trust. The responsibility to monitor for malicious activities and protect sensitive data extends beyond merely adopting security ...
The Voice of Cyberยฎ
TECHNOLOGY
Newest Release
Deep Dive Articles
Sort By
- Date
- Title
Recently at the Oracle CloudWorld Tour held at the Shangri-La in Singapore, Oracle's CEO Safra Catz, Singapore's Minister for Communications and Information and Second ...
Comment and Q&A from Satnam Narang, sr. staff research engineer at Tenable on CVE-2022-38028: GooseEgg EoP Exploit
At the AWS Summit in Sydney, experts discussed AI's role in enhancing SOC analysts' capabilities and the importance of integrating safe, responsible AI practices. Key ...
AI - An Overview
Artificial Intelligence (AI) is a technology that creates intelligent systems to perform tasks which typically require human intelligence. While the use of ...
Today, many organisations are trapped in what's known as a 'captivity cloud,' where they are locked-in with a single product or service but face substantial challenges when ...
An article around how to prioritise foundational cloud security before leveraging Generative AI.
In The News
Sort By
- Date
- Title
Theย Tenable Cloud Risk Report 2024, published today, reveals that a staggering 74% of organisations have publicly exposed storage assets, including those containing sensitive ...
Security Operations Leader Arctic Wolf will Provide Tecala Customers Industry-Leading Capabilities to Tackle the Increasing Dangers of Advanced Cyberattacks
Forescout today published the โDRAY:BREAKโ Research Report. The report identifies 14 previously unknown vulnerabilities in routers manufactured by DrayTek, a Taiwanese ...
Off-the-shelf offensive security tools and poorly configured cloud environments create openings in the attack surface
Sydney, Australia, October 2, 2024 - Obsidian Security, the leader in SaaS Security, is proud to support the data sovereignty goals of its Australian customers and extend its ...
The next generation of SolarWinds Observability delivers innovative and comprehensive full-stack visibility across all IT environmentsโon-premises, cloud, or hybridโwith ...
Podcasts On TECHNOLOGY