Cybersecurity News that Matters

Cybersecurity News that Matters

By Julien Legrand, Head of Cyber Solutions at Thales A growing number of business and industry leaders are concerned about the onslaught of cyberattacks targeting the operational technology (OT) they rely on for critical operations. According to a 2023 Blackberry research report [1] involving 1,500 manufacturing IT decision-makers worldwide, 40% said they are most concerned […]

In 2011, I came across a vendor on an online second-hand store who was selling a music player that I had been craving for years, the iPod Touch. The price was 100,000 won (almost $80), less than one third of the cost of the original product. The deal was too good to be true for […]

By Vinny Sagar, Solution Architect of swIDch Traditional perimeter-centric network security is based around a well-defined network boundary where all enterprise resources such as devices, file servers, applications, etc. were inside the network and users’ access to the network was strictly controlled. I like to compare traditional perimeter-centric network security to old forts since they […]

Opinion

By Julien Legrand, Head of Cyber Solutions at Thales A growing number of business and industry leaders are concerned about the onslaught of cyberattacks targeting the operational technology (OT) they rely on for critical operations. According to a 2023 Blackberry research report [1] involving 1,500 manufacturing IT decision-makers worldwide, 40% said they are most concerned […]

In 2011, I came across a vendor on an online second-hand store who was selling a music player that I had been craving for years, the iPod Touch. The price was 100,000 won (almost $80), less than one third of the cost of the original product. The deal was too good to be true for […]

By Vinny Sagar, Solution Architect of swIDch Traditional perimeter-centric network security is based around a well-defined network boundary where all enterprise resources such as devices, file servers, applications, etc. were inside the network and users’ access to the network was strictly controlled. I like to compare traditional perimeter-centric network security to old forts since they […]

The Readable has expanded its readership by publishing quarterly magazines in hard copy. The magazines are distributed only through The Readable’s readership network and are not published online. If you would like to have a copy, please contact us through email. Below is an editor’s note, which was printed on April 14 in the first […]

By Julien Provenzano, CEO and co-founder of RALFKAIROS The emergence of large language models (LLMs) has piqued the curiosity of cybersecurity experts, who are delving into how these potent tools can fortify their security strategies. As the CEO of RALFKAIROS, I have been keeping a watchful eye on the digital landscape and the escalating importance […]

By Ravi Ithal, Founder and CTO of Normalyze Updated Apr. 6, 2023 5:57PM GMT+9 Back when thieves physically stole cash and treasure from bank vaults, an infamous criminal was asked, “Why do you rob banks?” “Because that’s where the money is,” he replied. The modern version of treasure is data—especially the sensitive data of customers, […]

By Kihong Kim, CEO of SANDS Lab “Technology-driven intelligence companies, such as SANDS Lab, can have a positive impact on the security market by entering KOSDAQ.” This is the suggestion that I heard from an industry expert after completing the final evaluation for technology special listing last January. Although SANDS Lab was initially founded as […]

By Grace Han, CEO of SSNC In today’s digital age, security threats are constantly evolving, making it increasingly difficult for organizations to keep their networks and data secure. One of the key components of network security is the firewall, which acts as a barrier between an organization’s internal network and the outside world. Firewall policies […]

Being in the spotlight can bring pain and distress to the protagonist. On Thursday, almost all media outlets in South Korea gathered at one place in Seoul to listen to Hwang Hyeon-sik, CEO at LG Uplus, the telecommunication conglomerate which has been brought to the center of attention regarding the recent breaches that took place […]

By Thomas Park, General Manager of Korea Operations at Foxit Software Updated Feb. 10, 2023 2:17PM GMT+9 Portable Document Format (PDF) security is critical in today’s digital age because PDF is widely used as a standard for sharing documents with external parties. Created by Adobe’s founder in 1993, PDF has become a dominant file format […]

Stay Ahead with The Readable's Cybersecurity Insights