In the Asia Pacific region, ransomware is posing a serious concern as APAC organizations are 80% more likely than the global average to be the target of a cyber-attack according to a study.
While no organisation is immune to cyberattack, there are useful strategies every organization can put into place to protect...
Remote work and bring-your-own-device (BYOD) policies have greatly complicated the task of securing workplace technology. Remote work implementations and practices can exponentially increase security vulnerabilities. This presents a serious challenge for organizations struggling with limited cybersecurity resources....
Protecting your outbound email is the first step in securing enterprise inboxes from BEC attacks and attackers are continually outsmarting SEG protection.
Download this whitepaper to learn more about your legacy SEG is not enough to protect your company against data loss and ransomware attacks.
In this white...
Due to the rapid digital transformation healthcare has undergone, the healthcare industry is facing a fundamentally new threat landscape. Providers need to understand the challenges ahead, the problems they will face and most importantly how to solve these issues.
Read this report to learn:
Healthcare's...
We began last January with the realization that we have met a new and far more difficult class of cyber threat with the SolarWinds attack followed by the Colonial Pipeline attack in May. Both point to a fully wired world where physical and digital are colliding at unprecedented speeds.
If we had to choose a theme...
The past two years have been a challenge for security leaders. 2020 started with COVID-19 and a pell-mell shift to remote work, and finished with the gut-punch of a major breach (SolarWinds) that put hundreds of organizations into frantic assess-and-remediate mode.
How are security leaders expected to patch today...
Organizations build a security operations center (SOC) to protect against the latest cybersecurity threats. But security leaders responsible for a SOC are often littered with questions about what a SOC does, why it can't be more agile and why breaches still happen after spending so much on security.
Security...
So what happens when you as a security leader
get that call to protect the cybersecurity of
executive leaders and board members outside the
office? What are the right and wrong responses?
Chris Pierson of BlackCloak shares new insight
on executive protection best practices.
Download this eBook to learn more...
Today’s remote workplace is a fertile breeding ground for insider risk
– not just malicious threats, but accidental ones and compromised
insiders, too. Brian Reed of Proofpoint looks at the different insider
threat personas and how to mitigate their unique risks.
Download this eBook to learn more about:
The...
While SEGs (Secure Email Gateways) may claim to protect emails from all possible threats, they unwittingly send infected emails to users, just waiting for them to act. Since the invention of email, phishing has evolved continuously, and hackers have been finding
new ways to infiltrate users’ inboxes and trick...
This survey is currently closed. Thank you.
Information Security Media Group (ISMG) is conducting a worldwide survey for industrial & operational technology based on the NIST cybersecurity framework: Identify, Protect, Detect, Respond and Recover.
Your responses will help determine common achievements and gaps in...
It’s been a tumultuous time when it comes to ransomware and breaches. Extended detection and response (XDR) has become the answer for security teams needing a simpler, more effective way to approach these cybersecurity concerns.
In this report, “Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR,”...
Ransomware attacks targeting IT networks disrupt everyday life when the safety and availability of operational technologies are at risk. Despite the valiant efforts of cyber professionals, security best practices and better “cyber hygiene” are ineffective against the blended approaches adversaries employ, and a...
Discover more about MITRE Engenuity’s first evaluation of the Industrial Control Systems (ICS) threat detection market and how the Dragos Platform and other participant solutions performed in a realistic demonstration attack against an Operational Technology (OT) environment.
This guide offers a high-level...
SASE adoption is being driven by numerous factors, including the opportunity to address the challenges with unmanaged applications and devices, provide greater visibility into various tasks, and ensure consolidation of investments in the networking infrastructure to bring down the administrative cost, according to a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.