User data stories

AttackIQ commits to CISA's Secure by Design initiative
Thu, 29th Aug 2024
#
cybersecurity
#
cloud services
#
user data
AttackIQ signs CISA's Secure by Design pledge, aiming to integrate robust security measures into all products, enhancing global digital safety and inspiring industry standards.

Acronis True Image returns with enhanced cybersecurity features
Thu, 18th Jul 2024
#
storage
#
data protection
#
advanced persistent threat protection
Acronis reintroduces True Image with superior cybersecurity, tackling modern threats and offering an all-in-one backup solution for home users.

Surge in cybercrime on Telegram highlights security concerns
Thu, 4th Jul 2024
#
ddos
#
apm
#
cybersecurity
Kaspersky reports a 53% rise in cybercriminal activity on Telegram between May and June 2024, highlighting the platform's growing appeal for fraud, DDoS attacks, and data leaks.

How AI is used in cloud ERPs - now and in the future
Fri, 24th May 2024
#
data analytics
#
martech
#
personalisation
The integration of AI and cloud ERPs, such as NetSuite, is transforming business systems with hyper-personalisation, predictive analytics, and intuitive user interactions.

How AI is powering the next-generation of cybercriminals
Wed, 20th Mar 2024
#
malware
#
ai
#
cybersecurity
Cybercriminals increasingly harness AI for innovative and harder-to-detect attacks, using tools like ChatGPT to improve malware efficiency, automate phishing attempts and exploit APIs vulnerabilities.

IWD 2024: Expert security insight from within the gaming industry
Thu, 7th Mar 2024
#
ddos
#
mfa
#
cybersecurity
The gaming industry must increase cybersecurity efforts amid growing threats; risks include data theft and game manipulation, leading to financial losses and a decrease in public trust, says Mindera's Gaming lead, Teresa Matos.

Barracuda Networks tackle rising Aussie credential stuffing scams
Wed, 24th Jan 2024
#
surveillance
#
passwordless
#
cybersecurity
Barracuda Networks proposes sturdy measures against escalating Australian credential stuffing scams, affecting around 20,000 consumers, with increased bot-assisted logins and poor password hygiene.

Operation Triangulation: Undocumented iPhone hardware feature exposed
Thu, 28th Dec 2023
#
devops
#
apm
#
software development
Kaspersky's GReAT team has uncovered an undisclosed iPhone hardware feature used in Operation Triangulation attacks.

Privacy concerns rise over popular AI photo apps – study
Wed, 13th Dec 2023
#
ai
#
user data
#
tiktok
Over a third of AI photo apps use your personal data to train their AI tools, raising privacy concerns, says a study.

IT leaders see cloud infrastructure as leading cyber risk source
Thu, 7th Dec 2023
#
datacentre infrastructure
#
cloud services
#
user data
A study by Tenable shows that 68% of Australian IT leaders view cloud infrastructure as a chief source of cybersecurity risks.

New SecurityGen study highlights hidden threat to 5G networks
Fri, 18th Aug 2023
#
uc
#
firewalls
#
ddos
Telecom security experts call on operators to implement comprehensive cyber-security measures against GTP threats.

9 out of 10 mobile games ignore user privacy: Usercentrics
Tue, 25th Apr 2023
#
gaming
#
digital entertainment
#
data privacy
Mobile game publishers are not aligned with mobile industry’s evolution towards consent, despite brands increasingly insisting on using only compliant data.

Forcepoint's cloud-native approach to user activity & insider threat monitoring
Mon, 5th Oct 2020
#
casb
#
dlp
#
ueba
Forcepoint has launched Dynamic User Protection, a cloud-native user activity and insider threat monitoring solution delivered as a service.

Dormant employee accounts a major cyber risk for Singapore businesses
Mon, 9th Oct 2017
#
pam
#
user data
#
one identity
Only seven percent of respondents in Singapore say they remove access for users immediately upon a change in HR status.

NEC releases facial recognition software - passwords, a thing of the past?
Thu, 27th Apr 2017
#
digital signage
#
surveillance
#
biometrics
NEC's new facial recognition software could make traditional passwords obsolete, boosting security for mobile services.

Data discussions daunt digital disruption
Thu, 12th May 2016
#
encryption
#
iot
#
healthtech
Over the last few weeks, there have been several items in the news that mark an increasing trend about data ownership and usage.