Building cyber resilience in a decentralised world

Andrew Kay, Director of Systems Engineering at Illumio, APJ, argues that cybersecurity teams must shift from a reactive mindset to adopting proactive strategies. With today’s rapidly evolving and decentralised environments, having visibility and understanding the situation is vital for stopping threats before they escalate. Source: Intelligent CIO APAC Key Points Cybersecurity teams are stuck in […]

Read More →

Indian HR leaders expect agentic AI adoption to grow 383 pc by 2027: Report

Summary According to a recent report, Indian HR leaders anticipate a staggering 383% growth in the adoption of agentic AI by 2027. This transformation points to a major shift in workplace dynamics, with AI agents expected to take on greater roles autonomously, fundamentally changing the landscape of business operations. The report, compiled by Salesforce through […]

Read More →

The Future Of Gaming: Trends, Challenges, And Innovations [Guest Newsletter Editor]

The Future of Gaming: A Polygon Blueprint The gaming landscape is undergoing a rapid transformation, with implications that ripple through the gambling industry. Three key trends are reshaping player engagement and the future of gaming: the integration of NFTs, the rise of psychological gaming, and the blurring lines between traditional gaming and gambling. Non-Fungible Tokens […]

Read More →

Skills-Based Hiring: A Strategic Shift for 2025 and Beyond

An estimated 70 million U.S. workers, dubbed STARs (Skilled Through Alternative Routes), have the skills needed for quality roles but lack college degrees. This article explores how HR leaders can tap into this often-overlooked talent pool through skills-based hiring, focusing on real-world capabilities instead of traditional qualifications. The insights provided will help HR professionals rethink […]

Read More →

Building Client Relationships That Actually Last in Cybersecurity

Many cybersecurity sales occur during moments of crisis. A breach happens, compliance deadlines approach, or new regulations demand urgent budgets. In these situations, vendors rush in with technical demos and competitive pricing, but this hurried approach leads to relationships that rarely last. Once the immediate panic subsides, clients often reconsider their choices, shopping around for […]

Read More →

Why layoffs increase cybersecurity risks

A recent wave of layoffs in the tech industry has raised significant concerns about cybersecurity risks. As companies rush to revoke access for departing employees, the potential for insider threats and security breaches becomes more pronounced. With 54% of tech hiring managers anticipating further layoffs in the coming year, it’s crucial for organisations to manage […]

Read More →

Why layoffs increase cybersecurity risks

A recent wave of layoffs in the tech industry has raised significant concerns about cybersecurity. With companies rushing to sever access for departing employees, it’s crucial to understand the potential risks involved and how to mitigate them effectively. Key Risks During Layoffs Insider threats: Departing employees can inadvertently or deliberately take sensitive data. Inadequate offboarding […]

Read More →

Quadruple regulation: What manufacturers of connected products need to know now

Summary The introduction of four new EU regulations marks a significant shift in the manufacturing landscape for connected products, demanding heightened scrutiny on product safety, cybersecurity, and data access. The regulations include the General Product Safety Regulation (GPSR), the Cyber Resilience Act (CRA), the Data Act, and the new Product Liability Directive. Together, these laws […]

Read More →

NIST proposes new metric to gauge exploited vulnerabilities

NIST has introduced a new way to estimate which software vulnerabilities have likely been exploited, and it’s calling on the cybersecurity community to help improve and validate the method. Content Summary The new metric, “Likely Exploited Vulnerabilities” (LEV), aims to address a significant gap in vulnerability management by helping identify which reported flaws are actually […]

Read More →