Corner OfficeCXO BytesSecuring IT Infrastructure Against Generative AI Cybersecurity ThreatsNarasimha Raju8 months agoBy Ranjan Chopra In recent years, generative artificial intelligence (AI) has emerged as a groundbreaking technology with the ability to...
CXO BytesExposure Management – The Proactive Tool to Fend Off Sophisticated Cyber ThreatsNarasimha Raju10 months agoThe rising cybersecurity risks are a cause for worry for IT teams across verticals. This is where organizations need a...
CXO BytesThe Impact of Cyber Threats and Data Breaches on Digital TrustNarasimha Raju10 months agoDigital trust has evolved to become a strategic differentiator for businesses. With the growing digitalization of businesses and governance, trust...
Corner OfficeCXO BytesAddressing the skills shortage with an assertive approach to cybersecurityThorsten Stremlau2 years agoMay 16, 2022Year on year, cyber-attacks continue to become more sophisticated and more frequent. Attacks on industries such as healthcare, finance and...
ColumnsExpert OpinionSecurity2021: A Year in Review for Enterprise Cyber-securityCXOtoday News Desk2 years agoDecember 14, 2021It has become crucial to develop the cloud security architecture and strategy with the objectives of the threat actors in mind.
Corner OfficeExpert OpinionSecurityEnterprise Data Protection: What are the Top Trends in 2022?CXOtoday News Desk2 years agoWith 2022 around the corner, here are the top seven trends in the data protection space, according to Veeam experts.
Press ReleaseSophos 2022 Threat Report: Gravitational Force of Ransomware Black Hole Pulls in Other Cyberthreats to Create One Massive, Interconnected Ransomware Delivery SystemSophosCXOtoday News Desk2 years agoNovember 23, 2021In-depth report identifies trends in ransomware services, commodity malware, attack tools, cryptominers, and more, that are impacting IT security ...
News & AnalysisNewsletterSecurityIT Security Leaders: It’s time for a Bigger Seat at the TableCXOtoday News Desk3 years agoSeptember 20, 2021IT teams must have a bigger seat, and budget, at the boardroom table, while embedding their cybersecurity efforts across business functions.
News & AnalysisSecurityAttacks on Telcos, Cryptos on the Rise, Finds CrowdStrike Threat ReportCXOtoday News Desk3 years agoSeptember 9, 2021A recent research report by CrowdStrike highlights an explosion in adversary activity, both in volume and velocity.
IoTNewsletterResearch & WhitepapersSecurityIoT Malware Poses Big Threat to Corporate Networks, Finds StudyCXOtoday News Desk3 years agoAugust 2, 2021Businesses have seen a 700% increase in IoT-specific malware in the last 12-18 months, according to a new report.