BlackBerry Appoints John Giamatteo as CEO

December 12, 2023 at 03:55PM Company to pursue complete separation of IoT and cybersecurity business units. Based on the meeting notes, the company has decided to pursue a full separation of the IoT and cybersecurity business units. This likely means that they will be operating as distinct and separate entities moving forward. Full Article

BT and Netskope Partner to Provide Secure Managed Services

December 12, 2023 at 03:41PM I’m happy to help! However, I cannot access the specific text you provided as . If you could share the text you’d like me to summarize, I would be more than happy to assist you. I’m sorry, but I cannot access or process external content or documents. However, if you … Read more

Modern Attack Surface Management for CISOs

December 7, 2023 at 04:22AM Modern Attack Surface Management (ASM) is essential for CISOs as traditional methods can’t keep up with evolving digital threats and cloud-based environments. Modern ASM solutions should offer continuous, real-time discovery and contextual risk assessments across all environments. Trend Vision One™ provides comprehensive, automated ASM with total visibility, prioritization, and remediation … Read more

Middle East CISOs Fear Disruptive Cloud Breach

December 6, 2023 at 11:34AM Middle Eastern organizations are adopting cloud services rapidly, but 70% feel their cloud security is inadequate, above the global average of 63%. Cybersecurity concerns, local regulations, and geopolitics affect cloud adoption strategies. With increased cloud usage, the threat of significant disruption from breaches rises, although losses in Saudi Arabia and … Read more

Keeper Security Survey Finds 82% of IT Leaders Want to Move Their On-Premises Privileged Access Management (PAM) Solution to the Cloud

December 5, 2023 at 06:55PM Keeper Security’s report highlights IT leaders’ preference for cloud-based over on-premises Privileged Access Management (PAM) solutions due to cost and complexity concerns. 82% favor moving PAM to the cloud for better security and efficiency. The report also emphasizes the need for zero-trust and zero-knowledge cybersecurity in the current economic climate. … Read more

The Role of the CISO in Digital Transformation

November 28, 2023 at 06:09AM Modern-day demands require organizations to be flexible and digitally savvy, with a focus on remote work and cloud computing. The role of the chief information security officer (CISO) is crucial in ensuring secure digital transformation. The CISO must balance innovation with security, collaborate with other leaders, and engage early in … Read more

The Role of the CISO in Digital Transformation

November 21, 2023 at 03:59PM The role of the chief information security officer (CISO) is becoming increasingly important as organizations modernize their workflows and migrate to the cloud. The CISO must balance innovation and security, collaborate with other leaders, and ensure security is considered at all stages of the process. A strong CISO collaborates with … Read more

Qatar & Rwanda Partner to Boost Cybersecurity in Africa

November 15, 2023 at 11:18AM Rwanda and Qatar have partnered to collaborate on cybersecurity strategies, including improving public key infrastructure and supporting AI research. The collaboration aims to enhance information and communication technology in Africa and promote innovation locally and internationally. Plans include exchanging policies and strategies, sharing experiences in digital transformation and e-commerce, and … Read more

Zero Day Threat Protection for Your Network

November 6, 2023 at 03:28AM Zero day threats are security vulnerabilities that have been detected in a system or device but have not yet been patched by the vendor community. These threats can be targeted towards specific companies or applications and can cause significant damage, including financial losses. Relying solely on vendors to address these … Read more

Considerations for Managing Digital Sovereignty: The Executive Perspective

November 3, 2023 at 09:10AM Businesses value the availability, scalability, and reliability of cloud computing, which enables data to be accessed and processed globally. However, the rise of cloud computing has led to increased scrutiny of data governance and ensuring compliance with digital sovereignty requirements. Cloud providers can help navigate these challenges by offering products … Read more