Ten state attorneys general are urging Apple to address privacy and security gaps in third-party applications available on the App Store that track, collect or store reproductive health data. The letter comes as scrutiny intensifies over how large tech firms handle sensitive health data.
How can companies take a data-centric approach to their zero trust strategy? Two experts - Scott Leach, vice president Asia Pacific at Varonis, and Maheswaran Shanmugasundaram, country manager for South Asia at Varonis - share why getting a handle on your data helps improve cybersecurity.
In 2022, 56% of lower education organizations and 64% of higher education organizations were hit by ransomware in the last year.
This is a considerable increase from the 44% of education respondents that reported an attack in our 2021 survey (based on 499 respondents across lower and higher education).
Download...
In this report, 55% of manufacturing and production organizations were hit by ransomware in 2021, up from 36% in 2020.
This is a 52% increase over the course of a year, demonstrating that adversaries have become considerably more capable of executing the most significant attacks at scale.
Download this Report...
CEO Yotam Segev says Cyera eschews the focus of data loss prevention tools on blocking users from pulling down data and instead embraces an approach that reduces friction. Cyera has sought to safeguard data by making preventative changes in areas like configuration, permissions and security posture.
In an ESG research it was found that employees were spending an average of six hours per week doing work-related tasks outside of office hours. This shows that even before the pandemic hit, the lines between office and home life had begun to blur.
As this lead to a disturbance in the enterprise architecture,...
To enable a secure anywhere, anytime access, Security and risk management (SRM) leaders, responsible for infrastructure security should include some specific activities in their SASE roadmap.
This whitepaper focuses on what should be the strategic roadmap and what are the software-defined and cloud-delivered,...
Netskope has built out a full SASE stack and helped enterprises secure their physical devices through the recent acquisitions of Infiot and WootCloud. Buying SD-WAN provider Infiot in August will boost the convergence of networking and security and help customers quickly on-ramp users in the cloud.
Co-founder and CEO Bipul Sinha has grown Rubrik's business with existing customers by more than 40% thanks to the company's unique take on data observability. The data security vendor has emphasized data availability and resiliency in the face of crippling ransomware and extortion-based attacks.
Organisations are facing sophisticated and well-funded adversaries with targeted penetration strategies, including supply chain attacks. Despite multi-layered security investments, these threat actors are successfully breaching defenses and going after organisations’ data. That’s why data security is your last –...
Cybersecurity and IT leaders globally are fretting about data protection. But investments in data loss protection (DLP) are inconsistent and, even with a legacy DLP solution, respondents still worry about being vulnerable to data loss. And the shift to remote and hybrid work has complicated the picture by widening the...
Changing your data loss prevention (DLP) solution is a major transition that can feel overwhelming. But relying on DLP built for an earlier era of business can be just as costly and expose your organization to needless risk. Download this e-book for three compelling reasons to modernize your approach to DLP. It...
Data doesn't move itself. People—whether they are negligent, compromised or malicious—move data in secure and risky ways. Legacy approaches to data-loss prevention (DLP), building walls around your critical data, fails in today’s always-connected world. This e-book explores the growing challenges of today’s...
Preparedness is the best way to avoid having a cyberattack turn into a full breach. Organizations often realize after the breach the full impact on the organization and the systems as a whole. An effective incident response plan could better prepare your business continuity and put you in control.
This guide is...
According to a recent report 68% of Organizations fell victims to Cyberattacks last year in-spite of the claim that they were using world-class protection. As cyber threats become ever more complex, the pressure to have the right endpoint security in place has also grown.
This Guide provides the clarity by giving...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.