As voice cloning becomes a viable threat, financial institutions need to be aware of the possibility of fraud in voice-based interfaces, says Gur Geva, CEO of iiDENTIFii.
Modern business security: The power of unified cloud protection
SSE brings security closer to users and applications, allowing proactive threat detection, real-time monitoring and rapid response to potential security incidents, says John Mc Loughlin, CEO of J2 Software.
The interconnectedness of systems and the rapid adoption of new technologies has further complicated the task of securing companies, says Len Noe, technical evangelist and white hat hacker at CyberArk.
Embracing identity-centric zero trust: A glimpse into the future of the modern cyber security perimeter
Identity-centric zero trust builds on zero trust principles, making user identity the new perimeter, says Michael de Neuilly Rice, cyber security architect at NEC XON.
Building a framework for effective, agile endpoint security
Agile endpoint security measures, which can adapt quickly to the changing attack landscape, are paramount for ensuring an effective first line of defence, says Gideon Viljoen, pre-sales specialist: ICT security at Datacentrix