Home Kumar S
Written by

Kumar is a cybersecurity professional with over 20 plus years of experience in the industry, currently serving as Chief Information Security Officer (CISO) at a prominent organization. In addition to his executive role, he holds the position of Editor-in-Chief at Cyber Tech Journals, where he contributes to advancing cybersecurity knowledge and best practices.

106 Articles
Oracle Confirms Data Breach in Legacy Cloud Systems What You Need to Know
Cyber Attacks

Oracle Confirms Data Breach in Legacy Cloud Systems: What You Need to Know

Oracle confirms data breach that a hacker accessed two legacy, deprecated servers—not part of Oracle Cloud Infrastructure (OCI)—leaking login credentials such as usernames,...

Securing Your Business with the Right Firewall
AwarenessFirewalls

Are you Securing Your Business with the Right Firewall?

In today’s hyper-connected world, businesses face an ever-growing array of cybersecurity threats. From ransomware attacks to data breaches, the risks are real, and...

Best Business Firewalls 2025 Future-Proofing Security
Best

Best Business Firewalls 2025: Future-Proofing Security

In an increasingly interconnected and threat-laden digital landscape, the bedrock of any robust cybersecurity strategy for businesses, irrespective of their size, remains a...

Malaysia Airports Hit by Cyberattack
Cyber Attacks

Malaysia Airports Hit by Cyberattack; Hackers Demand US$10 Million Ransom

Examining the impact of Malaysia Airports Hit by Cyberattack and broader implications for critical infrastructure security.

Ultimate Guide to Protect Your Business from Email Compromise in 2025
Advisories

Ultimate Guide to Protect Your Business from Email Compromise in 2025

Have you ever imagined your business’s bank account being emptied because of a single email? Or your company’s secrets falling into the wrong...

How to Train Employees on Cybersecurity Awareness & Prevent Human Errors
How-To

How to Train Employees on Cybersecurity Awareness & Prevent Human Errors

In today’s digital landscape, train employees on cybersecurity is no longer optional—it’s essential. As cybercriminals increasingly target human vulnerabilities through phishing, social engineering,...

How to Conduct a Cyber Risk Assessment for Your Business
How-To

How to Conduct a Cyber Risk Assessment for Your Business

Here’s a shocking reality: 60% of small businesses close within six months of experiencing a cyber attack. Yet, according to recent studies, only...

Cybersecurity for Small Businesses
How-To

Cybersecurity for Small Businesses: Why Small Businesses Are Prime Targets

In today’s digital age, cybersecurity for small businesses is no longer optional—it’s a necessity. Shockingly, 60% of small businesses close their doors within...

Cybersecurity Policy
How-To

How to Create a Robust Cybersecurity Policy for Your Organization

In 2025, the digital landscape is more interconnected and perilous than ever. Organizations face an unrelenting barrage of sophisticated cyberattacks, making a robust cybersecurity...