PRESS
MyCena® in the news

MyCena Security Solutions have devised a new security model that addresses human-error cyber threats, protecting organisations against 95% of today’s breaches.

Access Segmentation and Encryption Management (ASEM) is a new security model being announced today, that offers organisations the highest available level of protection against cyberattacks by addressing 95% of cybersecurity breaches, while reducing costs and significantly improving cyber resilience.

 »  Read More

A new security model has been launched this week, dubbed Access Segmentation and Encryption Management (ASEM), which is being touted as the most comprehensive cybersecurity protection available today.

The model, which is currently only available through MyCena Security Solutions, addresses 95% of cybersecurity breaches, while reducing costs and significantly improving cyber resilience.

 »  Read More

What Is Chatgpt?

Posted on : 20 October 2023

GPT chat is one of the advanced technologies now used to improve human productivity.

Being able to respond to questions and commands in “human” language is an advantage for GPT Chat over Google.
This article is about TribunJatim.com with your GPT chat? Advanced technology can be used as a fraud tool. Here's how to recognize fake emails

 »  Read More

The risk of data breaches in the Internet of Things is growing fast and the costs are rising faster. In the latest Trending Tech podcast, host Jeremy Cowan asks Thales’s marketing director for Digital Identity and Security, Stephane Quetglas how the industry is responding. Spoiler: It’s fighting back hard! Plus Robin Duke-Woolley, CEO and founder of Beecham Research warns of the costs of lost industrial production, repair, litigation, and reputational damage. Sit back, listen and learn about IoT Best Practices, before we sign off with the submarine story of  Elon Musk’s Wet Nellie. Allegedly. 

 »  Read More

NCSC, ICO on cyber myths

Posted on : 20 October 2023

If I cover up the attack, everything will be ok. Reporting to the authorities makes it more likely your incident will go public. Paying a ransom makes the incident go away. I’ve got good offline backups, I won’t need to pay a ransom. If there is no evidence of data theft, you don’t need to report to the ICO. You’ll only get a fine if your data is leaked. These are six ‘myths’ which the UK’s National Cyber Security Centre (NCSC) and the data protection regulator the ICO have identified as commonly held by organisations that have fallen victim to cyber incidents.

 »  Read More