Nair previously worked at TechCircle, IDG, Times Group and other publications, where he reported on developments in enterprise technology, digital transformation and other issues.
Android Spynote malware is masquerading as antivirus software to exploit Android processes to infiltrate devices, seize control and steal sensitive information from unsuspecting users. A report from Cyfirma shows the malware disguising itself as "Avast Mobile Security" in a recent campaign.
A malicious Python package that mimics a popular SSH automation library has been live on PyPi since 2021 and delivers payloads that steal credentials and create backdoors. The package steals AWS access and secret keys, sending them to a remote server operated through a VPN in Paris
As gen AI evolves beyond cloud-based models, downloadable AI models present new opportunities for both cybersecurity defenders and threat actors. The ability of offline models to bypass traditional ethical guardrails creates unique security challenges, according to Pascal Geenens, director, Radware.
Organizations face mounting pressure to address workforce displacement and ethical implications as AI reshapes cybersecurity, particularly in software engineering roles. The challenge extends beyond job displacement to critical concerns about data privacy and transparency.
Organizations integrating AI systems should adopt process-driven frameworks that mirror established cybersecurity standards, said Gerry Chng, chairman of Singapore Computer Society. The ISO SC 42 committee's 42,000 series provides a foundation for developing AI policies and standards.
Healthcare ransomware attacks have doubled since 2021, with 37% of organizations taking up to a month to recover, according to Sophos' State of Ransomware in Healthcare 2024 report. Organizations must rethink their approach to cybersecurity as attack surfaces expand and skills shortages persist.
As OT systems become more interconnected, traditional air gaps disappear, creating new risks, said Joseph Carson, chief security scientist and advisory CISO at Delinea. The convergence of IT and OT environments requires a stronger focus on protecting digital identities and access controls.
Organizations mistakenly believe their operational technology systems are air-gapped and immune to cyberthreats. Dawn Cappelli, director of OT-CERT at Dragos, discusses why these assumptions are dangerous security gaps and why organizations need to rethink their approach to OT security.
Vulnerabilities in a smart building energy management system including an easily exploitable, two-year-old flaw that hasn't been widely patched could let hackers take over instances misconfigured to allow internet exposure. The flaws affect Cylon Aspect software from electrical engineering firm ABB.
A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
With 75% of cybersecurity leaders facing the worst threat landscape they've seen and 90% reporting workforce shortages, emotional intelligence has become crucial for effective leadership and team retention, said Tara Wisniewski, EVP of advocacy, global markets and member engagement at ISC2.
Healthcare has become the number one target for cyberattacks, with organizations spending an average of $11 million per ransomware incident, says Jojo Nufable, vice president at St. Luke's Medical Center. He shares why traditional security approaches fall short as AI-powered devices proliferate.
With the proliferation of IoT devices, organizations face mounting security challenges from varying security protocols and authentication methods. AI-powered automation emerges as a crucial tool for managing this complexity, said Philippe Bletterie, vice president at Alcatel-Lucent Enterprise.
As organizations rapidly deploy AI applications, many bypass crucial governance frameworks. This rush to implement without proper oversight creates significant compliance and security risks, said Tarun Samtani, advisory board member at International Association of Privacy Professionals.
Adopting standards like ISO 27000 can help organizations align with national security goals and regional cooperation, but simply following compliance checklists falls short, said Anthony Lim, fellow, cybersecurity, governance and fintech, Singapore University of Social Sciences.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.