News

Does your company need cyber insurance? While high-profile cyber attacks on firms such as Marks & Spencer generate most of ...
A sophisticated cyber campaign targeting Microsoft 365 users employs fake OAuth applications to circumvent multifactor authentication (MFA) protections, representing the latest evolution in ...
Unheeded agents can cause havoc, rewriting application code, sharing confidential data and even moving money between accounts ...
As large language models evolve, their influence on cybersecurity is rapidly expanding, empowering defenders with ...
CCI staff share recent surveys, reports and analysis on risk, compliance, governance, infosec and leadership issues. Share details of your ...
Many companies lack visibility into complex digital supply chains, meaning hidden risks and regulatory exposure. Cyber ...
The URL aka.ms/myrecoverykey is a shortcut link provided by Microsoft that redirects users to a secure Microsoft account page ...
The Space Force has an array of sensors scattered around the world to detect and track satellites and space debris. The 18th ...
India’s rapid digital growth through UPI, Aadhaar, and AI is facing rising cyber threats, many of which are state-sponsored. In a conversation with ETCISO DeepTalks, DFCCIL’s CISO Alok Shankar Pandey ...