cyber risk management

  1. Protecting Mobile Devices from Agentic AI Malware: Strategies & Defense

    The rise of Agentic AI Assistants—powerful digital agents that can perceive, interpret, and act on behalf of users—has revolutionized the mobile landscape, ushering in an unprecedented era of convenience, productivity, and automation. Yet, with every technological advance comes an accompanying...
  2. Safeguarding AI-Powered Cybersecurity: How Language Can Be a Vulnerability

    Artificial intelligence agents powered by large language models (LLMs) such as Microsoft Copilot are ushering in a profound transformation of the cybersecurity landscape, bringing both promise and peril in equal measure. Unlike conventional digital threats, the new breed of attacks targeting...
  3. Critical Vulnerabilities in Trend Micro Apex Central & Endpoint Encryption Addressed with Urgent Updates

    Trend Micro has recently addressed several critical vulnerabilities in its enterprise-level tools, Apex Central and Endpoint Encryption (TMEE) PolicyServer, underscoring the importance of prompt software updates to maintain robust cybersecurity defenses. Apex Central serves as a web-based...
  4. South Africa’s First Cyber Security Warranty: Enhancing Business Resilience in a Digital Era

    For South African businesses grappling with the mounting pressures of a digital-first economy, the announcement of the BUI Cyber Security Warranty represents a significant step-change. As cyber threats escalate in complexity and consequence, many organisations are seeking more than just...
  5. Top Microsoft 365 Security Challenges in 2025: Protect Your Organization

    In the rapidly evolving digital landscape, Microsoft 365 has become a cornerstone for organizational productivity, offering a suite of tools that facilitate communication, collaboration, and data management. However, its widespread adoption has also made it a prime target for cyber threats...
  6. Next-Gen Security & Automation in Southeast Asia: Microsoft Sentinel & Copilot Studio

    Singapore’s status as a technological and economic powerhouse in Southeast Asia is hard-won, built on decades of digitally driven advances and relentless investment in modern infrastructure. Yet, as the digital landscape becomes more intertwined with daily life, organizations across the region...
  7. BUI Launches South Africa's First Cyber Security Warranty for Business Resilience

    In a significant development for South African businesses, global technology consultancy BUI has introduced the BUI Cyber Security Warranty, the nation's first cyber security warranty designed to offer financial protection and response assurance against severe cyber threats. This initiative...
  8. Critical XXE Vulnerability in Rockwell Automation FactoryTalk Historian & How to Protect Your ICS

    Rockwell Automation’s FactoryTalk Historian integration with ThingWorx stands as a cornerstone in the rapidly evolving landscape of industrial automation and digital transformation. When headlines broke regarding a critical vulnerability tied to its use of Apache log4net configuration files...
  9. Siemens Siveillance Video Vulnerability CVE-2025-1688: Risks, Mitigations, and Essential Security Strategies

    Siemens Siveillance Video, a well-established software solution in the video management domain, stands as an integral pillar of many critical infrastructure and enterprise security environments worldwide. Designed to be the keystone in layered surveillance deployments, Siveillance Video...
  10. Siemens Desigo CC Vulnerability (CVE-2024-23815): Critical Security Insights & Mitigation Strategies

    The Siemens Desigo CC platform, a flagship building management system deployed in commercial and critical manufacturing sectors worldwide, has emerged at the center of a high-severity cybersecurity advisory, underlining both the increasing sophistication of threats to industrial control systems...
  11. Microsoft Copilot AI Bypass Exposes Enterprise Security Vulnerabilities

    The cybersecurity community was jolted by recent revelations that Microsoft’s Copilot AI—a suite of generative tools embedded across Windows, Microsoft 365, and cloud offerings—has been leveraged by penetration testers to bypass established SharePoint security controls and retrieve restricted...
  12. Microsoft's Deputy CISOs Lead the Future of Cybersecurity Innovation and Resilience

    In the rapidly evolving domain of digital security, one constant has emerged: the need for visionary leaders capable of navigating the complexity of modern cyber risk while simultaneously fostering innovation across vast, global organizations. At the center of this high-stakes balancing act...
  13. Critical Vestel AC Charger Vulnerability Highlights EV Infrastructure Cyber Risks

    The recently disclosed vulnerability in the Vestel AC Charger, identified as CVE-2025-3606, highlights the persistent risks faced by the rapidly growing market for electric vehicle (EV) charging solutions. As electric vehicles become increasingly prevalent worldwide, the infrastructure that...
  14. Enhancing Manufacturing Security with IoT, OT, and Zero Trust Strategies

    As the manufacturing sector races ahead in its digital transformation, the intersection of IoT, OT, and security comes sharply into focus. Today, the digital thread runs deep in factories, weaving intelligent automation, connected sensors, and remote operations into a unified tapestry that...
  15. Yokogawa Data Recorders Under Cyber Threat: Risks, Vulnerabilities, and How to Protect Critical Infr

    Take a moment to imagine an industrial control room—the hum of hardware, the glow of screens, reams of data painting the story of a power plant, factory, or water treatment facility in real time. Now, imagine the unsung heroes at the center of it all: Yokogawa recorder products. For engineers...
  16. Siemens Mendix Runtime Vulnerability Explained: Critical Risks and Security Tips for Industrial Oper

    Unveiling the Siemens Mendix Runtime Vulnerability: What Industrial Operators Need to Know In an era where digital transformation interlaces deeply with industrial operations, the security of software platforms that power these environments becomes paramount. Siemens' Mendix Runtime—a...