Insights

Robust remote access security for the utilities sector advances with Zero Trust

Cyberattacks on utilities more than doubled from 2020 to 2022. It’s likely the case that the rapid growth of connected assets is outstripping security capabilities....

If you get an unexpected call from Apple Support, you’re being hacked

Have you ever had an unexpected direct phone call from Apple support? I have not, and if you do ever receive one, you probably aren’t...

NetSuite adds more Text Enhance gen AI capabilities

In the supply chain domain, Text Enhance can now help enterprise teams create support tickets for warehouse management issues and shipment summaries that describe the...

7 tips for leading without authority

1. Create a shared vision Rob Rogers is a data scientist and the CEO of Oii.ai, an AI company that automates supply chain design. He...

Swiss Federal Railways CIO relies more on AI than concrete

A few years ago, SBB prescribed three optimization programs that will cost around €1 billion by 2027. In terms of traffic management, the aim is to make...

Trending News

AceCryptor attacks surge in Europe – Week in security with Tony Anscombe

Video The second half of 2023 saw massive growth in AceCryptor-packed malware spreading in the wild, including courtesy of multiple spam campaigns where AceCryptor packed...

A prescription for privacy protection: Exercise caution when using a mobile health app

Privacy Given the unhealthy data-collection habits of some mHealth apps, you’re well advised to tread carefully when choosing with whom you share some of your...

Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe

Video Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in...

Threat intelligence explained |Unlocked 403: A cybersecurity podcast

Video We break down the fundamentals of threat intelligence and its role in anticipating and countering emerging threats Alžbeta Kovaľová 14 Mar 2024 The threat...

How to share large or sensitive files securely online

How To Here are a few tips for secure file transfers and what else to consider when sharing sensitive documents so that your data remains...

APT attacks taking aim at Tibetans – Week in security with Tony Anscombe

Video Evasive Panda has been spotted targeting Tibetans in several countries and territories with payloads that included a previously undocumented backdoor ESET has named Nightdoor...