Artificial Intelligence Artificial Intelligence | Editor's Desk | Featured | TechTime | October 21, 2024 AI & Quantum: The next legal frontiers We sat down with Mr. Yeong to delve into the rising tensions around AI ownership, the need for more transparency,… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | October 14, 2024 The focus of communicating cybersecurity to company directors We speak with Chirag Joshi, Founder and CISO at 7 Rules Cyber – an innovative cyber security advisory and thought… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Events | Featured | IT solutions | TechTime | September 30, 2024 OT ISAC – Singapore Operational Technology Information Sharing and Analysis Summit 2024 We had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in… Read More Editor's Desk Editor's Desk | Featured | Risk Management | vulnerabilities | September 27, 2024 ICS-OT Directed Ransomware is Not Likely to Happen By Daniel Ehrenreich, SCCE, ICS-OT Cyber Security Expert Industrial Control Systems/Operation Technology (ICS-OT) cyber security practitioners were traditionally educated to… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | Women in Security | September 24, 2024 The Risk Story – Software Supply Chain Security We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 24, 2024 Forescout Releases New SaaS Operational Technologies Solution Cybersecurity company Forescout Technologies has unveiled a new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 16, 2024 Winning the OT Security Battle We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity.… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | October 14, 2024 The focus of communicating cybersecurity to company directors We speak with Chirag Joshi, Founder and CISO at 7 Rules Cyber – an innovative cyber security advisory and thought… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Events | Featured | IT solutions | TechTime | September 30, 2024 OT ISAC – Singapore Operational Technology Information Sharing and Analysis Summit 2024 We had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in… Read More Editor's Desk Editor's Desk | Featured | Risk Management | vulnerabilities | September 27, 2024 ICS-OT Directed Ransomware is Not Likely to Happen By Daniel Ehrenreich, SCCE, ICS-OT Cyber Security Expert Industrial Control Systems/Operation Technology (ICS-OT) cyber security practitioners were traditionally educated to… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | Women in Security | September 24, 2024 The Risk Story – Software Supply Chain Security We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 24, 2024 Forescout Releases New SaaS Operational Technologies Solution Cybersecurity company Forescout Technologies has unveiled a new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 16, 2024 Winning the OT Security Battle We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity.… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Cyber Resilience Cyber Resilience | Editor's Desk | Events | Featured | IT solutions | TechTime | September 30, 2024 OT ISAC – Singapore Operational Technology Information Sharing and Analysis Summit 2024 We had the privilege of speaking with Steven Sim, Chair of the OT-ISAC Executive Committee, during the recent summit in… Read More Editor's Desk Editor's Desk | Featured | Risk Management | vulnerabilities | September 27, 2024 ICS-OT Directed Ransomware is Not Likely to Happen By Daniel Ehrenreich, SCCE, ICS-OT Cyber Security Expert Industrial Control Systems/Operation Technology (ICS-OT) cyber security practitioners were traditionally educated to… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | Women in Security | September 24, 2024 The Risk Story – Software Supply Chain Security We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 24, 2024 Forescout Releases New SaaS Operational Technologies Solution Cybersecurity company Forescout Technologies has unveiled a new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 16, 2024 Winning the OT Security Battle We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity.… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Editor's Desk Editor's Desk | Featured | Risk Management | vulnerabilities | September 27, 2024 ICS-OT Directed Ransomware is Not Likely to Happen By Daniel Ehrenreich, SCCE, ICS-OT Cyber Security Expert Industrial Control Systems/Operation Technology (ICS-OT) cyber security practitioners were traditionally educated to… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | Women in Security | September 24, 2024 The Risk Story – Software Supply Chain Security We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 24, 2024 Forescout Releases New SaaS Operational Technologies Solution Cybersecurity company Forescout Technologies has unveiled a new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 16, 2024 Winning the OT Security Battle We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity.… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | Women in Security | September 24, 2024 The Risk Story – Software Supply Chain Security We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 24, 2024 Forescout Releases New SaaS Operational Technologies Solution Cybersecurity company Forescout Technologies has unveiled a new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 16, 2024 Winning the OT Security Battle We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity.… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 24, 2024 Forescout Releases New SaaS Operational Technologies Solution Cybersecurity company Forescout Technologies has unveiled a new SaaS Operational Technologies (OT) solution. Forescout for OT Security is the first… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 16, 2024 Winning the OT Security Battle We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity.… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Cyber Resilience Cyber Resilience | Editor's Desk | Featured | IT solutions | September 16, 2024 Winning the OT Security Battle We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity.… Read More Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Editor's Desk Editor's Desk | Featured | IT solutions | Risk Management | August 8, 2024 Series Insight – Supply chain defence and Third Party Risk Management Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain… Read More Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Cyber Resilience Cyber Resilience | Editor's Desk | Featured | vulnerabilities | July 23, 2024 Data Lake Security an Essential Part of Today’s Data Architecture By Vivek Shitole With nearly half a billion terabytes of data created and a significant portion transacted daily, the need… Read More Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next
Editor's Desk Editor's Desk | Featured | IT solutions | July 23, 2024 Proactive reduction in Information Security tickets/incidents using Six Sigma project methodology By Vivek Shitole Many organizations are good at deploying information security controls but are primarily reactive, meaning they are designed… Read More 1 2 3 … 49 Next