Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Dual Impact of AI on Power Grids: Efficiency and Vulnerability

Artificial intelligence (AI) has emerged as a promising solution to modernize power grids. The technology, alongside other upgrades like Internet of Things (IoT) connectivity, could make energy infrastructure more reliable and sustainable. However, AI power grids also pose significant cybersecurity risks. Attacks against critical infrastructure are becoming more common. As energy authorities ramp up their investments in AI, they should pay attention to these risks to enable a safer tech transformation.

Why Intelligent Content is the Key to Unlock the Potential of Data

In today's rapidly evolving digital landscape, organizations face the critical challenge of maintaining robust data security while ensuring seamless access and collaboration. As businesses become increasingly digitized, the volume of sensitive and confidential information shared across departments, with suppliers and partners, has skyrocketed. This digital transformation brings numerous benefits but also heightens the risk of data loss, leakage, and unauthorized exposure.

Daggerfly Enhances Malware Toolkit to Target All Major Operating Systems

The Chinese espionage group Daggerfly, also known as Evasive Panda or Bronze Highland, has significantly upgraded its malware arsenal, allowing it to target a wide range of operating systems including Windows, Linux, macOS, and Android. This development marks a notable escalation in the group's cyber capabilities, as detailed in a recent analysis by Symantec.

Security breaches in the supply chain increase by 68%

In today's digital landscape, businesses heavily rely on third-party software for their daily operations. This reliance has led to a surge in software supply chain attacks, which are becoming increasingly prevalent and sophisticated. These attacks exploit vulnerabilities in external tools or services to gain unauthorized access and compromise systems.

How To Configure PAM with DUO MFA | CyberArk

In this video, we walk you through the step-by-step process of configuring PAM (Pluggable Authentication Modules) and DUO Multi-Factor Authentication (MFA) with CyberArk. Strengthen your security posture and ensure robust access control for your sensitive data and systems. What You'll Learn: Tools and Resources: CyberArk DUO MFA Pluggable Authentication Modules (PAM) Step-by-Step Instructions.

What are PECR? Securing electronic communications in line with the latest requirements

Any organisation that sends electronic marketing communications via phone, fax, email or text, uses web cookies, or provides communications services to the public falls under the scope of the PECR, and must be aware of its information security requirements.

Unlocking the Power of Kubernetes Data Management: Mastering CSI and Non-CSI Snapshots for Enhanced Security and Efficiency

In the rapidly evolving landscape of containerized applications, robust data backup solutions are essential. This is particularly true in production Kubernetes environments, where data integrity and availability are paramount. This post explores the critical roles of CSI snapshots & Non-CSI snapshots in Kubernetes, and how CloudCasa by Catalogic enhances data protection and management capabilities across diverse Kubernetes deployments.