Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Millions of Kia Vehicles Exposed to Remote Hacks via License Plate: The Growing Risk of Automotive API Vulnerabilities

In an increasingly connected world, the lines between digital security and physical safety are rapidly blurring. The automotive industry, now more reliant on connectivity than ever before, faces a new wave of cybersecurity threats. Millions of Kia vehicles, ranging from the 2013 model year to 2025, were recently found to be vulnerable to remote hacking via license plate information.

What Is ARM64 and Why Should You Use It?

In this video, learn what ARM64 is, its architecture, its advantages over x86 and other processors, and other general benefits. Resources and social media: Transcript: If you’re wondering what ARM64 is, let’s flash back a few years… During the 2000s, ARM processors led the way in the mobile revolution, providing our smartphones and tablets with serious computing power. ARM’s 32-bit chips were built on reduced instruction set computer (RISC) architecture that clocked speeds of 1 to 2 GHz, and became the dominant chip inside the devices we put in our pockets.

How to Add Azure Account as a Datasource

In this BDRSuite demo, I’ll guide you through adding an Azure Account as a Data Source in BDRSuite Backup Server.` BDRSuite provides robust protection for your Azure data, allowing you to back up and recover virtual machines, storage accounts, and other Azure resources efficiently. It supports flexible storage options, secure backups, and easy recovery processes.

Asia's Evolving AI Regulatory Landscape: Lessons from Cybersecurity Regulation

Artificial intelligence (AI) is transforming industries across Asia, driving innovation, economic growth, and societal advancements. However, AI’s profound impact also brings significant governance challenges. As with any transformative technology, robust regulatory frameworks are essential to mitigate risks, ensure ethical use, and protect public interests. Reflecting on the evolution of cybersecurity regulation may provide insight into how AI regulation might develop.

The Importance of DevSecOps in Mobile Apps

Some of the biggest and most successful businesses around the globe adopt a security-first strategy right from day one to ensure sustainability in growth. Regarding scalability, faster time to market, or competitive advantages, security must sit right at the top of business strategy. Security ensures that regular business operations and innovations remain uninterrupted pre or post-production.

VP of Product Marketing Vivek Bhandari on ticker News: Modernize patching with AI and automation

Automation is crucial in reducing cybersecurity vulnerabilities, says Vivek Bhandari, VP of Product Marketing at Tanium. Poor patching methods create a backlog of security issues, or “vulnerability debt,” which can leave organizations exposed. Bhandari urges companies to modernize their processes and use AI and automation to quickly identify and fix vulnerabilities. This proactive approach can significantly reduce risk and keep systems secure.

An Introduction to Threat Monitoring

According to CIS, just in the first half of 2024, malware-based threats rose by 30% from 2023. A similar 30% year-over-year increase was also found in cyber attacks in 2024 in a report by Check Point Research. With such alarming statistics, it is evident that the need for threat monitoring has become more critical than ever before. In this blog post, we'll explore what threat monitoring entails, why it's essential, and how you can implement best practices to safeguard your business.