English News

CISA creates catalog of known exploited vulnerabilities, orders agencies to patch

CISA creates catalog of known exploited vulnerabilities, orders agencies to patch

The US Cybersecurity and Infrastructure Security Agency has established today a public catalog of vulnerabilities known to be exploited in the wild and has issued […]
Gartner Predicts Half of Cloud Data Centres Will Deploy Robots with AI Capabilities by 2025

Gartner Predicts Half of Cloud Data Centres Will Deploy Robots with AI Capabilities by 2025

Robots to Help Alleviate Staff Shortage Challenges Plaguing Data Centre Industry By 2025, half of cloud data centres will deploy advanced robots with artificial intelligence […]
CrowdStrike to Extend Zero Trust Protection to the Data Layer with Acquisition of SecureCircle

CrowdStrike to Extend Zero Trust Protection to the Data Layer with Acquisition of SecureCircle

In today’s enterprise, everything flows through the endpoint. Users and identities are authenticated through the endpoint, while code repositories, cloud workloads, SaaS applications and files […]
Hackers-for-Hire drive the Evolution of the New ENISA Threat Landscape

Hackers-for-Hire drive the Evolution of the New ENISA Threat Landscape

The 9th edition of the ENISA Threat Landscape (ETL) report released by the European Union Agency for Cybersecurity highlights the surge in cybercriminality motivated by […]
Gartner Survey Finds More Than Half of Digital Government Programmes Are Failing to Scale

Gartner Survey Finds More Than Half of Digital Government Programmes Are Failing to Scale

Almost One-Quarter of Government Organisations Classified as Digitally Advanced Despite increased focus and investment, 55% of digital government programmes are failing to scale, according to […]
New activity from Russian actor Nobelium

New activity from Russian actor Nobelium

Today, we’re sharing the latest activity we’ve observed from the Russian nation-state actor Nobelium. This is the same actor behind the cyberattacks targeting SolarWinds customers […]
Gartner Forecasts Worldwide IT Spending to Exceed $4 Trillion in 2022

Gartner Forecasts Worldwide IT Spending to Exceed $4 Trillion in 2022

Analysts Discuss the Outlook for the Global IT Market During Gartner IT Symposium/Xpo 2021 Americas, 18-21 October Worldwide IT spending is projected to total $4.5 […]
Gartner Unveils Top Predictions for IT Organisations and Users in 2022 and Beyond

Gartner Unveils Top Predictions for IT Organisations and Users in 2022 and Beyond

Analysts Explore Lessons Learned from Ongoing Disruption and Uncertainty at Gartner IT Symposium/Xpo 2021 Americas, 8-21 October Gartner, Inc. today revealed its top strategic predictions […]
Gartner Identifies the Top Strategic Technology Trends for 2022

Gartner Identifies the Top Strategic Technology Trends for 2022

Analysts Explore Industry Trends at Gartner IT Symposium/Xpo 2021 Americas, 18-21 October Gartner, Inc. today announced the top strategic technology trends that organisations need to […]
ISAGCA and ISA Security Compliance Institute Release Joint Study on IIoT Product Certifications Based on the ISA/IEC 62443 Standard

ISAGCA and ISA Security Compliance Institute Release Joint Study on IIoT Product Certifications Based on the ISA/IEC 62443 Standard

The ISA Global Security Alliance (ISAGCA) and the ISA Security Compliance Institute (ISCI) have announced the release of a co-sponsored Industrial Internet of Things (IIoT) […]
Gartner Says Government Organisations Are Increasing Investment in AI, But Their Workforce Remains Apprehensive

Gartner Says Government Organisations Are Increasing Investment in AI, But Their Workforce Remains Apprehensive

Government organisations around the world are adopting artificial intelligence (AI) technologies to help them achieve their public purpose or mission, but government employees are still […]
US to work with 30 countries to tackle ransomware problem

US to work with 30 countries to tackle ransomware problem

The Biden administration announced today plans to hold a meeting with representatives from 30 countries, including NATO allies and G7 partners, on the topic of […]
NSA, CISA Release Guidance on Selecting and Hardening Remote Access VPNs

NSA, CISA Release Guidance on Selecting and Hardening Remote Access VPNs

The National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Information Sheet today detailing factors to consider when choosing […]
Lithuanian government warns about secret censorship features in Xiaomi phones

Lithuanian government warns about secret censorship features in Xiaomi phones

The Lithuanian Defense Ministry published a security audit on Wednesday for three popular 5G smartphone models manufactured in China, recommending that citizens avoid or stop […]
A Security-by-Design Approach to Protecting Your Business-Critical Applications

A Security-by-Design Approach to Protecting Your Business-Critical Applications

98% OF THE FORTUNE 100 USE SAP OR ORACLE EBS +  77% OF THE WORLD’S TRANSACTION REVENUE TOUCHES THESE ERP SYSTEMS We have seen an escalation […]
Critical Controls for SAP Implementation

Critical Controls for SAP Implementation

The Critical Controls Implementation for SAP is the first document in a series of implementation documents from the ERP working group that focuses on specific […]