Cybersecurity
-
People and Technology, a Winning Combination at ING
Source: CIO MagazineRead more: People and Technology, a Winning Combination at INGSuccess in business digital transformation relies on a strong people-centered culture. ING’s focus on technology and personnel collaboration has proven…
-
Toys ‘R’ Us Canada Customer Information Leaked Online
Source: SecurityWeekRead more: Toys ‘R’ Us Canada Customer Information Leaked OnlineA significant data breach has occurred involving Toys ‘R’ Us Canada, where customer information has been leaked on the dark…
-
Shifting your organizational focus from MTTD to MTTC in 8 steps
Source: CIO MagazineRead more: Shifting your organizational focus from MTTD to MTTC in 8 stepsThis article outlines eight steps to transition from focusing on mean time to detect (MTTD) to mean time to contain…
-
The Cybersecurity Perception Gap
Source: The Hacker NewsRead more: The Cybersecurity Perception GapMany organizations experience a cybersecurity perception gap, which can lead to significant blind spots. Findings from the Bitdefender 2025 Cybersecurity…
-
CIOs, be ready for agentic AI — or be out of a job
Source: CIO MagazineRead more: CIOs, be ready for agentic AI — or be out of a jobCIOs face a challenge as employees rapidly adopt agentic AI tools, enhancing productivity but also posing security and compliance risks.…
-
AI ‘workslop’: The new productivity killer only training can stop
Source: CIO MagazineRead more: AI ‘workslop’: The new productivity killer only training can stopAI tools promise increased productivity but can generate low-quality content known as ‘workslop’. This results from inadequate skills in using…
-
The more corporate IT leaders, the greater the need to coexist
Source: CIO MagazineRead more: The more corporate IT leaders, the greater the need to coexistCIOs are increasingly taking on multiple roles in corporate IT, including that of CTO and CISO. The surge in technology…
-
3000 YouTube Videos Exposed as Malware
Source: The Hacker NewsRead more: 3000 YouTube Videos Exposed as MalwareA malicious network has exploited YouTube by publishing over 3,000 videos that lead to malware downloads. This network has been…
-
Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks
Source: SecurityWeekRead more: Microsoft Disables Downloaded File Previews to Block NTLM Hash LeaksMicrosoft has taken measures to enhance security by disabling downloaded file previews that could inadvertently leak NTLM hashes. This action…
-
What Measures Can IT Directors Take to Progress in the Era of AI
Source: CIO MagazineRead more: What Measures Can IT Directors Take to Progress in the Era of AIIT directors see AI as a key tool for automating repetitive tasks, allowing focus on higher-value functions. This transformation is…







