English News

Is Secure and Trusted AI Possible? The EU Leads the Way

Is Secure and Trusted AI Possible? The EU Leads the Way

The European Union Agency for Cybersecurity (ENISA) releases 4 reports on the most far-reaching challenges in artificial intelligence (AI) on the occasion of the conference […]
China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan

China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan

Recent tensions between China and Taiwan have been escalating due to China’s increasing military presence and provocative actions in the region. China has long claimed […]
MOVEit Transfer Zero-Day Vulnerability Exploited in Data Theft Attacks

MOVEit Transfer Zero-Day Vulnerability Exploited in Data Theft Attacks

A zero-day vulnerability affecting MOVEit Transfer has been reported being actively exploited by hackers worldwide. MOVEit Transfer is a popular file transfer program developed by […]
How To Address Your Customers’ Data Security Requirements

How To Address Your Customers’ Data Security Requirements

Data protection has become a critical concern for businesses today. Company partnerships and collaborations often involve the exchange of sensitive data, making it imperative for […]
What is the role of a CISO during a cyber attack?

What is the role of a CISO during a cyber attack?

The CISO plays a crucial role in incident management during cyber attacks as they are responsible for implementing containment and eradication measures. However, it is […]
What Is Cloud Security Posture Management (CSPM) & How to Do It

What Is Cloud Security Posture Management (CSPM) & How to Do It

In this blog, we will outline the advantages of cloud security posture management, why you should adopt it, how it can help your organization identify […]
Why Adopt SOC 2? A Guide to Compliance and Its Benefits

Why Adopt SOC 2? A Guide to Compliance and Its Benefits

SOC 2 compliance is voluntary. Here’s why you might want it anyway. With the regulatory landscape growing more complex by the year, the last thing […]
The Only ERP-focused Solution in Gartner’s Application Security Magic Quadrant, 3 years in a row!

The Only ERP-focused Solution in Gartner’s Application Security Magic Quadrant, 3 years in a row!

Today, I’m proud to announce that Onapsis has once again been recognized in the Gartner® Magic Quadrant for Application Security Testing, making this the third […]
Gartner Forecasts Worldwide Government IT Spending to Grow 8% in 2023

Gartner Forecasts Worldwide Government IT Spending to Grow 8% in 2023

Governments Are Increasing Digital investments in Response to Global Turmoil Worldwide government IT spending is forecast to total $589.8 billion in 2023, an increase of […]
Why Preparation for Quantum Computing Starts Now

Why Preparation for Quantum Computing Starts Now

Once considered unbreakable, today’s encryption algorithms could be vulnerable. Here’s how enterprises can become quantum resistant. When AI bots went mainstream this year, there was […]
Gartner Identifies 12 Actions to Improve Data Quality

Gartner Identifies 12 Actions to Improve Data Quality

Gartner Analysts Are Exploring Data Trust, Governance and Privacy at the Gartner Data & Analytics Summit, 22-24 May, in London, UK Gartner, Inc. identified 12 […]
The Top Five Data Security Risks in Manufacturing

The Top Five Data Security Risks in Manufacturing

We might not think of factories as repositories of sensitive information, but increasingly they are. From superconductors to sunflower oil, the goods made in production […]
Modernizing Vulnerability Management for Full Attack Surface Coverage

Modernizing Vulnerability Management for Full Attack Surface Coverage

Traditional vulnerability management is no longer enough to mitigate business risks. For that, you will need Next-Gen Vulnerability Management. In this article, we will investigate […]
Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks

Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks

Since 2020, CrowdStrike has increasingly observed big game hunting (BGH) threat actors deploying Linux versions of ransomware tools specifically designed to affect VMWare’s ESXi vSphere […]
All About Unstructured Data

All About Unstructured Data

Understanding data is one of the first and most important steps to protecting it. Without knowing what kinds of data you’re processing and storing, it’s […]
What Are the Costs Associated with a PAM Solution?

What Are the Costs Associated with a PAM Solution?

Investing in cybersecurity is indispensable for companies of all sizes and industries, since threats such as data leaks and hacking attacks generate great financial losses. […]