Kroll news stories
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll.
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.
Kroll expands data breach notification support for AU businesses
“Australian organisations operating in different markets require support across several geographical regions and working knowledge of data breach notification in each region.”
Social media a growing business risk across Asia Pacific
Organisations now face an even wider risk landscape, as they seek to tackle emerging digital threats and deal with complex reputational and regulatory issues.
Kroll expands into Australia with Enex Carbon acquisition
The Enex Carbon team will join Kroll’s Cyber Risk practice and will be led by managing director and Asia Pacific leader Paul Jackson.
Asia's safest and most dangerous cities for digital security
NEC says there is evidence that some cities are taking threats seriously, particularly in Asia. Which are the top five safest & most unsafe cities?
Kroll takes on Hong Kong market with new APAC cybersecurity lead
"The addition of Paul to our team of cyber professionals further reinforces our commitment to the global expansion of our Cyber Security practice."
Survey finds China’s a hotspot for all types of fraud: Whistleblowing may be the answer
86% of respondents with operations in China experienced a fraud incident last year, a 13% jump since 2015.
Kroll expands global management team, new exec for Singapore
“I am very proud to announce their elevation within the Kroll organization.”
Kroll survey reveals cloud growth
Kroll Ontrack has revealed a surge in cloud storage and virtualisation adoption, but a shortage of proactive protocols in data protection.