As enterprise systems grow more automated and interconnected, cybersecurity is no longer just a matter of defending the perimeter. For Pega, a maker of low-code process automation tools used across regulated industries, security is a question of balance—between openness and control, speed and stability, autonomy and oversight. And that balance, according to Chief Cloud Officer […]
As cyber threats grow in sophistication and scale, Databricks is redefining how modern enterprises should think about security — both in the cloud and across artificial intelligence-powered systems. Omar Khawaja, Chief Information Security Officer (CISO) at Databricks, believes the future of cybersecurity lies not in chasing individual incidents, but in managing patterns, risks and data […]
With a customer base of more than 300,000 organizations worldwide, Atlassian’s platforms—Jira, Trello, Confluence, Loom, and newer additions like Rovo and Compass—have become essential tools for teams to plan, build, and innovate. However, that expansive reach also brings significant responsibility: ensuring these tools remain secure in the face of an increasingly sophisticated cyber threat landscape. […]
As generative artificial intelligence (AI) redefines both innovation and cybercrime, Google finds itself defending a new digital frontier. At the center of this effort is Gemini, the company’s powerful AI model, which has increasingly become a target for state-sponsored attackers. For Jayce Nichols, Director of Intelligence Solutions at Mandiant, part of the Google Threat Intelligence […]
As artificial intelligence, automation, and real-time data collection reshape the digital landscape, companies leading customer experience (CX) and customer relationship management (CRM) face an evolving cybersecurity challenge. Businesses striving to personalize interactions and extract insights from millions of customer touchpoints are also becoming prime targets for cyber threats—ranging from phishing and ransomware to AI-driven attacks […]
On Jan. 17, 2025, the European Union’s Digital Operational Resilience Act (DORA) took effect, marking a significant shift in the cybersecurity landscape for the financial sector. Designed to strengthen cyber resilience, DORA imposes strict regulations requiring financial institutions and their critical third-party service providers to implement robust cybersecurity measures. In effect, DORA requires financial entities […]
Cyber threats are more sophisticated and persistent than ever, making traditional security measures—such as firewalls, antivirus software, and endpoint detection—insufficient against advanced attacks. In recent years, observability has emerged as a game-changer, giving security teams unprecedented visibility into their IT environments. Organizations need more than basic monitoring; they require real-time, data-driven insights to detect and […]
SK Telecom, the parent company of the SK Group ICT Family, has developed ScamVanguard, an advanced artificial intelligence system that revolutionizes mobile scam prevention. The system offers strong protection against the ever-changing threats of financial fraud. ScamVanguard, which won the Best Innovation Award in Cybersecurity at CES 2025, uses state-of-the-art AI to safeguard users from […]
As businesses increasingly rely on cloud platforms to store critical data and run services, the threat landscape has become more sophisticated. According to Check Point Software Technologies, 61% of organizations experienced a cloud security incident in 2024, with 21% resulting in data breaches. Cybercriminals, equipped with advanced tools, relentlessly probe cloud environments looking for vulnerabilities. […]
In a digital world plagued by security breaches, weak passwords, and identity theft, biometrics are emerging as the frontrunner in the race for better cybersecurity. Fingerprints, facial recognition, voice patterns, and even behavioral traits are being hailed as the keys to a more secure and seamless digital experience. However, the path to replacing passwords is […]