Episode #1
When the pandemic came along earlier this year, more businesses increased their reliance on digital infrastructure. Today, businesses rely heavily on digital processes to run their operations. Clearly, the risk has shifted to digital platforms and DRM is the next...
The world-renowned cybersecurity certification body, EC-Council, has teased what is touted to be the “new methodologies to revolutionize the future of cybersecurity education.” The official announcement will be made on September 16, 2020.
The cybersecurity certification giant detailed on how...
Security researchers Mikhail Klyuchnikov and Nikita Abramov from Positive Technologies uncovered four severe vulnerabilities in Palo Alto Networks’ PAN-OS, a software that runs on the company’s next-generation firewalls used by over 66,000 companies in 150 countries. Cybercriminals could exploit...
It is not every day that you witness a star-studded lineup of CISOs and cybersecurity veterans come together on one platform with a common agenda–collectively shaping the OT/ICS security landscape –but this unbelievable feat was achieved at the inaugural...
The surge in remote work brought a new wave of security concerns, as many organizations believed that cyber habits of employees could compromise business systems or make corporate data vulnerable to cyberattacks. According to a new survey by the...
After VR, AR, and Mixed Reality (MR), Extended Reality (XR) and Spatial computing are gradually becoming the newer frontiers of advancements in the space of information technology and going by the Hyponnen Theory, anything connected to the internet is...
Google has always believed in abiding by its users’ confidentiality concerns and rights. However, when it comes to data in its cloud, Google found its customers worrisome with the company’s confidentiality quotient. How can someone be confident about something...
The Data Security Council of India (DSCI) and the Centre for Information Policy Research (CIPL) have jointly released a report on enabling responsible cross-border data transfers between India and the U.S. with regard to India’s proposed Personal Data Protection...
Small to medium-sized businesses (SMBs) are procuring security tools to prevent cyberattacks with limited cybersecurity budgets and resources. According to the “SMB IT Security Report” from Untangle, a provider of comprehensive network security for SMBs and distributed enterprises, SMBs...
The U.S. Department of Justice (DoJ) issued a fraud alert asking people to be vigilant when providing any sensitive information over the phone. The agency stated that cybercriminals are falsely representing themselves as DOJ authorities to obtain personal information...














