Data Security

  • Attack surface expansion: A closer look
    Data Security Dec 18, 2023 6 min

    Attack surface expansion: A closer look

    In the cybersecurity landscape, attack surface expansion isn't a new concept.

    Read more 
  • Maintaining mental well-being
    Data Security Dec 08, 2023 5 min

    Anticipating the future: Top 10 cybersecurity trends for 2024

    It's time to discuss the various trends forecast to shape cybersecurity in the next..

    Read more 
  • Maintaining mental well-being
    Data Security Nov 08, 2023 5 min

    Maintaining mental well-being: The key to sustainable cybersecurity success

    For many years, security analysts have..

    Read more 
  • Are you prepared to protect your organization's AI against data poisoning?
    Data Security Nov 07, 2023 6 min

    Are you prepared to protect your organization's AI against data poisoning?

    Artificial intelligence (AI) systems are often...

    Read more 
  • A SOC manager's dilemma: How to manage a distributed workforce
    Data Security Oct 24, 2023 6 min

    A SOC manager's dilemma: How to manage a distributed workforce

    The beginning of 2020 marked a serious turn of events for the corporate world.

    Read more 
  • 13 powerful measures for fortifying your Active Directory
    Data Security Sep 28, 2023 6 min

    13 powerful measures for fortifying your Active Directory

    Almost 90% of businesses employ Active Directory in their IT environments to...

    Read more 
  • How CISA's Zero Trust Maturity Model helps organizations protect against attacks
    Data Security Sep 08, 2023 6 min

    How CISA's Zero Trust Maturity Model helps organizations protect against attacks

    The ever-increasing number and...

    Read more 
  • The ultimate guide to implementing the Essential Eight Maturity Model—Part 1
    Data Security Aug 31, 2023 6 min

    The ultimate guide to implementing the Essential Eight Maturity Model—Part 1

    If you're an Australian entity that is not...

    Read more 
  • How attackers use artificial intelligence to deliver noxious strikes
    Data Security Aug 25, 2023 5 min

    How attackers use artificial intelligence to deliver noxious strikes

    Is there anything AI can't do? It can write, draw, edit, and code, all at an unhuman speed.

    Read more 
  • The new attack landscape with the advent of Apple Vision Pro
    Data Security Aug 23, 2023 5 min

    The new attack landscape with the advent of Apple Vision Pro

    On June 5, 2023, tech giant Apple announced its plan to release a spatial computer known...

    Read more 
  • Decoding the Digital Personal Data Protection Bill, Part 2
    Data Security Aug 10, 2023 6 min

    Decoding the Digital Personal Data Protection Bill, Part 2

    Ever since India's Digital Personal Data Protection (DPDP) Bill has been passed...

    Read more 
  • Decoding the Digital Personal Data Protection Bill, Part 1
    Data Security Aug 09, 2023 8 min

    Decoding the Digital Personal Data Protection Bill, Part 1

    Picture this: It's a Monday morning, you're late for work and waiting for your ride to arrive.

    Read more 
  • Spotify's costly mistake: The GDPR violation and the path to compliance
    Data Security Jul 13, 2023 6 min

    Spotify's costly mistake: The GDPR violation and the path to compliance

    Spotify, the popular music streaming service, has been the go-to platform for millions...

    Read more 
  • A beginner's guide to SOC 2 compliance
    Data Security Apr 18, 2023 6 min

    A beginner's guide to SOC 2 compliance

    The latest update to the service organization controls 2 (SOC 2), a voluntary...

    Read more 
  • Are firewalls obsolete in a Zero Trust network?
    Data Security Apr 06, 2023 5 min

    Are firewalls obsolete in a Zero Trust network?

    Many in cybersecurity agree that perimeter security is slowly being phased out since...

    Read more 
  • Security challenges associated with healthcare IoT devices
    Data Security Mar 31, 2023 8 min

    Security challenges associated with healthcare IoT devices

    The volume of cyberattacks and ransom demands on the healthcare...

    Read more 
  • The impact of AI in cybersecurity: Enterprise best practices to follow in 2023
    Data Security Mar 10, 2023 4 min

    Enterprise best practices to follow in 2023

    Over time, AI has proved critical for many cybersecurity use cases, including...

    Read more 
  • The current cybersecurity landscape of financial and banking industries
    Data Security Feb 21, 2023 23 min

    The current cybersecurity landscape of financial and banking industries

    "Compliance is just the bare minimum, we should... - Conversations with Volwin

    Read more 
  • How has the pandemic affected the cybersecurity landscape?
    Data Security Feb 16, 2023 33 min

    How has the pandemic affected the cybersecurity landscape?

    Attacks have started going against people more... - Conversations with Santosh

    Read more 
  • Canada's 5-year cybersecurity strategy and action plan: Is it relevant today?
    Data Security Jan 30, 2023 4 min

    Canada's 5-year cybersecurity strategy and action plan

    The past year has been difficult for Canadian organizations.

    Read more 
  • 13 key performance metrics that CISOs should track
    Data Security Jan 04, 2023 4 min

    13 key performance metrics that CISOs should track

    A chief information security officer (CISO) should track certain key performance...

    Read more 
  • Do startups need a CISO?
    Data Security Dec 26, 2022 3 min

    Do startups need a CISO?

    They do, indeed. Information security is paramount for any organization, regardless if it's a startup...

    Read more 
  • Criteria to measure CISO success
    Data Security Dec 07, 2022 3 min

    Criteria to measure CISO success

    According to Marlin Hawk's Global Snapshot: The CISO in 2021 report, 53% of CISOs have been in their...

    Read more 
  • Spotting the differences between SSH and Telnet
    Data Security Nov 29, 2022 3 min

    Spotting the differences between SSH and Telnet

    SSH and Telnet are two communication protocols that help users establish...

    Read more 
  • What is a security operation center and what should you know about it?
    Data Security Nov 21, 2022 5 min

    What is a security operation center and what should you know about it?

    A security operations center (SOC) is an enterprise monitoring...

    Read more 
  • Cyberwar games: An effective strategy for enhanced cyberdefense
    Data Security Nov 09, 2022 5 min

    Cyberwar games: An effective strategy for enhanced cyberdefense

    War games are not new. Armed forces throughout history have been...

    Read more 
  • 7 cybersecurity trends to watch for in 2023
    Data Security Oct 31, 2022 4 min

    7 cybersecurity trends to watch for in 2023

    Whether it is the never-ending list of compliance requirements to follow...

    Read more 
  • Singapore has adopted Zero Trust in government
    Data Security Oct 28, 2022 4 min

    Cloud security and data governance top security challenges for tech execs in 2022: Forrester

    Forrester's recent report, The State of...

    Read more 
  • Singapore has adopted Zero Trust in government
    Data Security Oct 18, 2022 5 min

    Singapore has adopted Zero Trust in government

    Lately there have been multiple instances of large-scale cyberattacks on government...

    Read more 
  • e-Estonia: Shedding light on Estonia's digital adoption and its cyberdefense model
    Data Security Oct 11, 2022 6 min

    e-Estonia: Shedding light on Estonia's digital adoption and its cyberdefense model

    Estonia has emerged as a global leader...

    Read more 
  • Aligning Zero Trust with the Essential Eight
    Data Security Oct 06, 2022 5 min

    Aligning Zero Trust with the Essential Eight

    The COVID-19 pandemic has stimulated a major digital transformation, but security...

    Read more 
  •  Map these 2 security frameworks to strengthen your cyberdefense
    Data Security Sep 29, 2022 6 min

    Map these 2 security frameworks to strengthen your cyberdefense

    A good cybersecurity plan exceeds its primary objective of protecting your enterprise data.

    Read more 
  • Why SIEM is a surefire way to help IT teams achieve SOX compliance
    Data Security Sep 23, 2022 6 min

    Why SIEM is a surefire way to help IT teams achieve SOX compliance

    Accounting firms, auditors, and all publicly listed companies experienced a pivotal...

    Read more 
  • Cybersecurity in healthcare: Part 2
    Data Security Sep 19, 2022 7 min

    Cybersecurity in healthcare: Part 2

    If you're excited about exploring how healthcare organizations can fortify their cyberdefenses to protect...

    Read more 
  • Cybersecurity in healthcare: Part 1
    Data Security Sep 08, 2022 7 min

    Cybersecurity in healthcare: Part 1

    Healthcare organizations are arguably the most popular targets for cyberattacks. According to the latest report...

    Read more 
  • What to keep in mind before diving into the murky waters of cyber insurance
    Data Security Aug 24, 2022 4 min

    What to keep in mind before diving into the murky waters of cyber insurance

    Where there's risk, there's insurance. In a field like cybersecurity that's overflowing...

    Read more 
  • 4 must-know GDPR principles for IT compliance
    Data Security Jul 29, 2022 6 min

    4 must-know GDPR principles for IT compliance

    The EU has recently approved two important acts: the Digital Services Act and the Digital Markets Act.

    Read more 
  • Zero Trust: The journey towards a secure network
    Data Security Jul 26, 2022 6 min

    Why the OAIC's proposed online privacy bill is going to be a game-changer for Australian internet privacy

    In the age of cookies, artificial intelligence, and targeted digital advertising...

    Read more 
  • Zero Trust: The journey towards a secure network
    Data Security Jul 14, 2022 6 min

    Zero Trust: The journey towards a secure network

    Do you trust your organization's network? Do you think deploying perimeter-based security solutions such as firewalls or VPNs is enough

    Read more 
  • Getting started with ISO 27001? Here's what you need to know
    Data Security May 26, 2022 6 min

    Getting started with ISO 27001? Here's what you need to know

    The ISO 27000 family of standards acts as an information security management framework for institutions around the world.

    Read more 
  • Essential Eight explained: ACSC's key security controls for organizational cybersecurity
    Data Security May 12, 2022 6 min

    Essential Eight explained: ACSC's key security controls for organizational cybersecurity

    In February, during the onset of the Russia-Ukraine war, the Australian Cyber Security Center (ACSC) sent out a key...

    Read more 
  • Security streams you must know to commence your career in cybersecurity: Part 2
    Data Security Apr 28, 2022 6 min

    Security streams you must know to commence your career in cybersecurity: Part 2

    Hi, there! It's nice to see you again. If you're excited about exploring a few more vital security streams, you won't be disappointed.

    Read more 
  • Protecting payment card information with PCI-DSS
    Data Security Apr 22, 2022 6 min

    Protecting payment card information with PCI-DSS

    The Payment Card Industry Data Security Standard (PCI-DSS) was first introduced in 2004 by the credit card giants American Express, MasterCard, Visa, and Discover.

    Read more 
  • Insider threat: The enemy is under your roof
    Data Security Apr 21, 2022 4 min

    Insider threat: The enemy is under your roof

    Research conducted by Ponemon Institute shows that from 2018 to 2020, the number of insider threats has increased 47% and the cost of these incidents escalated to $11.45 million.

    Read more 
  • Security streams you must know to commence your career in cybersecurity: Part 1
    Data Security Apr 18, 2022 6 min

    Security streams you must know to commence your career in cybersecurity: Part 1

    Digital transformation is a double-edged sword, as evidenced by the increasing cases of cyberattacks.

    Read more 
  • diversity-equity-inclusion-foster-better-cybersecurity-teams
    Data Security Apr 01, 2022 6 min

    DEI-friendly organizations foster better cybersecurity teams

    As cybercriminals come up with new ways to penetrate systems, it is important to cultivate and explore various perspectives for better defense against advanced threats.

    Read more 
  • book-review-cybersecurity-the-beginners-guide
    Data Security Mar 23, 2022 4 min

    A review of Dr. Erdal Ozkaya's book Cybersecurity: The Beginner's Guide

    The book Cybersecurity: The Beginner's Guide, authored by Dr. Erdal Ozkaya, covers a broad scope of topics, from the importance of cybersecurity..

    Read more 
  • cybersecurity-frameworks-first-priority-in-2022
    Data Security Feb 24, 2022 6 min

    Why cybersecurity frameworks should be your No.1 priority in 2022

    Interested Engineering, a science and technology web site says, "F-35 fighter jets are more susceptible to cyberattacks than missiles.

    Read more 

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.