Cybersecurity

Image of cybersecurity
The Hidden Security Gaps in Your Business Applications—and How to Fix Them
Hidden security vulnerabilities in ERP and financial systems, such as excessive user privileges and inadequate access controls, pose significant risks to business operations and compliance, necessitating a shift towards automated solutions for proactive governance and risk management.
Forterra
Beyond Identity: Securing Access and Enforcing Least Privilege Across Critical Applications
As increasing threats and complex IT environments render traditional identity and access management inadequate, organizations are adopting least privilege enforcement as a strategic necessity to enhance security and mitigate risks associated with privileged access across critical applications.
IBM building | IBM and Databand.ai
IBM Launches Dedicated Microsoft Practice to Accelerate AI and Cloud-driven Business Transformation
IBM is strengthening its partnership with Microsoft by establishing a Microsoft Practice within IBM Consulting aimed at leveraging AI, cloud, and security solutions to deliver measurable business outcomes across various industries undergoing digital transformation.
security
Critical Zero-Day Vulnerability Impacts SAP
SAP has issued critical Security Notes including a highly severe vulnerability in SAP NetWeaver Visual Composer that allows unauthenticated attackers to upload malicious files, prompting organizations to urgently patch or implement workarounds to protect their systems.
Fortifying the Factory Floor: A Cybersecurity Blueprint for Manufacturers
Fortifying the Factory Floor: A Cybersecurity Blueprint for Manufacturers
Cyberattacks on manufacturing operations can result in severe consequences including downtime, theft of intellectual property, and financial loss, with recent data revealing 88% of UK companies experienced breaches largely due to human error, emphasizing the need for fundamental security practices and robust measures from firms like Codestone to enhance cybersecurity resilience.
GRC and Cybersecurity: Rethinking Risk in the Era of ERP Modernization
As ERP systems become prime targets for cybercriminals, integrating Governance, Risk, and Compliance (GRC) with cybersecurity is essential for enterprise resilience and proactive risk management, utilizing layered security strategies and education to mitigate vulnerabilities and align with evolving regulatory pressures.
Fortifying the Factory Floor: A Cybersecurity Blueprint for Manufacturers
Strengthen Your ERP Security with Smarter SoD and User Access Management
Effective Segregation of Duties (SoD) and user access management in ERP systems are crucial for reducing fraud risks and ensuring compliance, necessitating automation, continuous access reviews, and a balanced approach to user privileges.
Cybersecurity
Why Identity Security is a Top Priority for Enterprises in 2025
In response to rising identity-related threats, 78% of organizations are set to increase their identity and access management spending in 2025, reflecting a strategic shift towards modern security measures that emphasize complex governance and AI-driven solutions to enhance resilience in the digital landscape.
Google to Acquire Wiz for $32 Billion in Cloud Security Push
Google Cloud to Acquire Wiz for $32 Billion in Cloud Security Push
Google Cloud has acquired cybersecurity platform Wiz for $32 billion, aiming to enhance security technology and scalability across multi-cloud environments.
Dell and Microsoft cybersecurity
Dell Strengthens Cybersecurity for Microsoft Customers
Dell Technologies and Microsoft are enhancing AI adoption to protect data and improve cybersecurity for multicloud environments.
A Step Ahead: Onapsis CEO Mariano Nunez
Onapsis CEO Mariano Nunez talks about the importance of cybersecurity in today's ERP landscape, shared security responsibility, and why it is vital to embed security from the start.
Fortifying the Factory Floor: A Cybersecurity Blueprint for Manufacturers
SMBs at critical risk, warns SonicWall as Cyberattack speed surges
SonicWall's 2025 Cyber Threat Report reveals a rapidly evolving cyber threat landscape, particularly targeting small and medium businesses (SMBs), with alarming increases in Business Email Compromise incidents, sophisticated attack tactics, and the urgent need for proactive security measures such as real-time patching and enhanced user training.
CrowdStrike expands cloud security reach with Oracle integration
CrowdStrike expands cloud security reach with Oracle integration
CrowdStrike is enhancing Oracle Cloud Infrastructure by integrating its Falcon Cloud Security platform to provide unified protection, streamline compliance, and empower organizations to effectively address evolving threats and vulnerabilities in their cloud environments.
Amazon AWS and DXC Technology
AWS Aims to Speed Cloud Adoption with Trust Center
Amazon Web Services (AWS) has launched the AWS Trust Center, a comprehensive online resource that provides essential security insights, compliance certifications, and real-time updates to enhance transparency and trust for customers transitioning to cloud-based systems, addressing key security concerns that influence cloud adoption.
The AI Responsibility Gap: A Looming Threat to Business?
The AI responsibility gap: A looming threat to business?
A new study by NTT DATA reveals that the rapid advancement of artificial intelligence is outpacing the establishment of responsible governance, creating an 'AI responsibility gap' that jeopardizes trust, investment, and accountability in AI implementation among organizations.
Fortifying the Factory Floor: A Cybersecurity Blueprint for Manufacturers
Security for innovation: Mimecast Incydr’s defense against DeepSeek and other Gen AI data risks
The rapid growth of generative AI tools like DeepSeek presents significant data security risks for organizations, necessitating enhanced protective measures such as Mimecast's Incydr platform to safeguard intellectual property while promoting safe and effective AI adoption.
SAP security
de Novo Solutions steels cybersecurity for Oracle, ServiceNow ecosystem
de Novo Solutions has successfully achieved re-accreditation of the Cyber Essentials Plus certification, underscoring its commitment to robust cybersecurity and data protection across its operations in the Finance, Procurement, HR, and Payroll sectors amidst rising cyber threats.
Deep Instinct
Deep Instinct blocks zero-day attacks in real time for NetApp and Amazon FSx
Deep Instinct's DSX for Cloud – Amazon FSx NetApp employs advanced AI-driven technology to deliver comprehensive, real-time security against zero-day attacks, ensuring data integrity and operational efficiency for organizations managing hybrid environments.
NTT DATA Okta cybersecurity certification
NTT DATA earns Okta Workforce Identity Cloud Service Specialization in Japan
NTT DATA's Japan operations have achieved the Okta 'Workforce Identity Cloud Service Delivery Specialization,' affirming its expertise in cybersecurity and commitment to enhancing identity and access management services amidst increasing cyber threats.
Implementing Cloud ERP: Codestone’s Six-Phase Approach
NetApp Sells Spot FinOps Platform to Flexera for $100 Million
NetApp's sale of its Spot by NetApp FinOps business to Flexera for $100 million indicates a strategic shift towards cybersecurity and AI, prompting CIOs and senior leaders to reevaluate their cloud management strategies and focus on integrated solutions amidst evolving industry demands.
Origina CEO: Beyond the patch, how to rethink your security safety net
Solid systems can crumble. In the high-stakes world of enterprise computing, we know that there are multiple layers throughout modern IT stacks straddling cloud and on-premises deployments that can be made to expose their inherent fragility and susceptibility to failure....
Fortifying the Factory Floor: A Cybersecurity Blueprint for Manufacturers
Accenture expands generative AI-powered cybersecurity services to enhance client resilience
Accenture has launched an enhanced suite of generative AI-powered cybersecurity services to help organizations strengthen their defenses against evolving cyber threats, emphasizing a tailored and proactive approach to tackle industry-specific vulnerabilities.
Forterra
SAP and Onapsis collaborate to provide security incident response
SAP customers hold essential responsibilities for threat detection and incident response in both on-premise and cloud environments, necessitating a clear understanding of roles and collaboration with SAP for effective cybersecurity incident response management.
Pagoda city surrounded by trees during sunset; client innovation in Japan concept
The Insider Look into NTT Group x Eviden Identity Management deal
December saw NTT Group select Evidian Identity Governance & Administration (Evidian IGA) as the foundation of their Identity Management Infrastructure in Japan. Eviden, part of Atos Group,  provides an Identity Governance and Administration (IGA) solution to ensure governance and scalability...
A green metal gate locked with a brass padlock |
Cybersecurity services are jumping on the AI progress train
As companies increasingly adopt AI technologies for cybersecurity, a recent Capgemini report reveals that while GenAI enhances threat response and detection, it also introduces new risks, prompting firms like Accenture and Dell to bolster their security offerings amid rising cyber threats.
image of two security cameras | CyberCare
Lines of Defence: Choosing the Right Security Solutions
Implementing cybersecurity measures ensures organisations are protected and ready to defend themselves against cyberattacks. These solutions help organisations benefit from data protection, regulatory compliance, and increased productivity. They prevent financial losses, build customer trust, provide protection for customers and support...
A darkened room with a man with big headphones sitting at 3 computer screens | Delinea
Data protection in a modern enterprise environment requires a dynamic approach
By having a clearer view and a tighter grip on exactly where privilege is provided throughout an organization, firms can significantly and efficiently improve their enterprise security and protection.
image of security camera on a building
Staying cyber secure amongst the cyber chaos
Being cyber secure is paramount for organizations across the globe and protecting client and organizational data is the key to ultimately delivering success for your business.
image of cyber-security
Nobody wants a leak: Getting cyber secure in manufacturing
Manufacturing firms are advancing their stacks, but openings have sprung for bad actors. How can businesses kick the bucket on cyber risks?  
Image of a stethoscope | Microsoft and The White House improve cybersecurity in hospitals
Microsoft and The White House work to improve cybersecurity in hospitals
Microsoft is working alongside The White House, the American Hospital Association and the National Rural Health Association to tackle the cybersecurity issues in the healthcare industry.