Scott Ikeda is a technology futurist and writer for more than 15 years. He travels extensively throughout Asia and writes about the impact of technology on the communities he visits. Over the last 5 ...
Most of the conversation around AI in cybersecurity focuses on how attacks are getting faster and more sophisticated. That is true, but it misses a more immediate issue. Many security teams are still ...
As data is continuously collected and acted upon, transparency becomes the mechanism through which organizations demonstrate ...
Cyber risk has become a barometer for corporate resilience and trust. As the landscape accelerates, boards are expanding how ...
London, UK-based education giant Pearson PLC has confirmed it suffered a data breach that potentially leaked corporate and customer information. “We recently discovered that an unauthorized actor ...
Due to some apparent poor choices in the default configuration settings of a piece of Microsoft software, 38 million records of private personal information have been exposed encompassing both major ...
The problem of social media cyber crime is growing at an astonishing rate and is now a $3 billion business. According to a recent report, nearly 1 in 5 organizations worldwide are now infected by ...
The Cisco network breach was traced back to an employee’s personal Google account that was syncing their company login credentials via Google Chrome. The Google account was protected by multi-factor ...
Personal information of over 2 million Aflac life insurance and Zurich auto insurance policyholders in Japan was leaked online in a third-party data breach. Aflac confirmed that hackers accessed 3.2 ...
The Co-op has confirmed that the April 2025 cyber attack resulted in data theft on a significant number of customers after hackers breached its systems. The UK retailer operates over 2,000 grocery ...
Data governance is essential in today’s fast-paced, highly competitive organizational world. With the ability to acquire large volumes of heterogeneous internal and external data, companies require a ...
When antivirus software is installed and activated, there is usually an assumption that the system is automatically safer. Antivirus software can be penetrated just like any other software can, ...