How Does Earth Kurma Threaten Southeast Asian Security?

Data Security

How Does Earth Kurma Threaten Southeast Asian Security?

What if your country's most sensitive data was silently slipping into the wrong hands? This ominous possibility is not far-fetched for Southeast Asia, where Earth Kurma, an Advanced Persistent Threat (APT) group, lurks in cyberspace, orchestrating espionage campaigns that undermine national security. As its tactics grow more sophisticated, the

Mastering Your First 90 Days as a CISO: A Success Roadmap

Data Security

Mastering Your First 90 Days as a CISO: A Success Roadmap

The cybersecurity landscape is perpetually shifting, presenting a daunting challenge for leaders stepping into the role of Chief Information Security Officer (CISO). Questions about leadership in such a dynamic arena can be tough, and many CISOs last only about eighteen months before moving on, reminding us of the turbulent nature of this role.

Minimus Launches Revolutionary Tool to Cut Software Vulnerabilities

Data Security

Minimus Launches Revolutionary Tool to Cut Software Vulnerabilities

In an age where technological advancement is crucial, software security becomes increasingly important as development relies heavily on cloud services and intricate supply chains. It's against this dynamic backdrop that Minimus Inc., an application security startup, has made a significant entrance at the prestigious RSAC Conference. With a

How Will Microsoft’s EU Cloud Expansion Impact Innovation?

Data Security

How Will Microsoft’s EU Cloud Expansion Impact Innovation?

In a significant move poised to reshape the technological landscape, Microsoft has announced its plan to expand its cloud and AI infrastructure in Europe, fueling discussion on its potential benefits and challenges. The initiative's scope is impressive, aiming for a 40% increase in data center capacity within the next two years, aligning with

Is Your Commvault Secure Against the Latest Zero-Day Threat?

Data Security

Is Your Commvault Secure Against the Latest Zero-Day Threat?

In today's ever-evolving world of cybersecurity threats, Commvault's disclosure of indicators of compromise (IoCs) concerning the exploitation of a zero-day vulnerability garners significant attention. This flaw, identified as CVE-2025-3928, poses a pervasive risk, especially as it is now part of CISA's Known Exploited Vulnerabilities catalog.

Kaseya 365 Endpoint: Streamlined Management and Cost Savings

Data Security

Kaseya 365 Endpoint: Streamlined Management and Cost Savings

In an increasingly complex digital landscape, maintaining secure, efficient IT operations is paramount for Managed Service Providers (MSPs) and internal IT teams. Kaseya 365 Endpoint emerges as a pivotal solution, designed to streamline endpoint management while presenting significant cost-saving opportunities. This comprehensive tool integrates

1 7 8 9 10 11 12 13 37
1 9 10 11 37

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later