Networks are fundamentally changing as a result of data being used across cloud environments. So security must be built into networks to improve mitigation of cyberthreats, says Nick Savvides, senior director of strategic business, APAC, at Forcepoint.
The year 2021 will see an increase in third-party risks, the evolution of MSSPs, and maturity in identity governance as enterprises in the Middle East region take a fast track approach to the 'cloud-first' strategy, according to a panel of experts.
In the three years since Equifax suffered a massive data breach, the consumer credit reporting firm says it has worked tirelessly to overhaul the security shortcomings that allowed the breach to happen. Equifax CISO Jamil Farshchi and other security experts weigh in on important lessons learned.
When implementing a cybersecurity risk framework, enterprises should use a structured approach to identity and evaluate and manage the risks posed by increased digital transactions during the pandemic, says Dmitry Chernetsky, global presales expert, Kaspersky-APAC.
Shocking but true: 44 percent of East-West traffic is not encrypted. If you ever needed a reason to evaluate your own network, our new TLS research report is jammed with more numbers that will motivate you to do so. Researchers studied 275 billion data flows to reveal real-world metrics of SSL/TLS protocol usage, and...
Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it's time to rethink strategy. As our new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security....
Download this report to learn how to manage unique security challenges posed by mission-critical operational environments containing IP-enabled devices and complex, interconnected networks and use unified visibility and systems to stay ahead of risks.
Shocking but true: 44 percent of East-West traffic is not encrypted. If you ever needed a reason to evaluate your own network, our new TLS research report is jammed with more numbers that will motivate you to do so. Researchers studied 275 billion data flows to reveal real-world metrics of SSL/TLS protocol usage, and...
How are organizations protecting their endpoints against ransomware and malware?
The "Endpoint Security Effectiveness" Report summarizes the results of a survey of over 450 IT and security professionals conducted by Virtual Intelligence Briefing (ViB) to understand how organizations protect their endpoints against...
Two recent Department of Homeland Security advisories pertaining to vulnerabilities in certain ultrasound systems from a major medical device maker - and multiple flaws in an open-source hospital information management system - highlight the range of security risks spanning various segments of the healthcare sector.
Using artificial intelligence and machine learning, bundled with an orchestration layer, will help CISOs mitigate cyberthreats, says Bharat Anand, chief of technology at NATGRID, the intelligence sharing network of the government of India.
Experts predict that digital transformation and remote work will accelerate in the new normal. So will the need to secure every kind of endpoint and safeguard sensitive corporate data. To succeed in the new reality, solutions must meet the rigorous security requirement of IT leaders while also accommodating users'...
In this whitepaper you will discover solutions that have the ability to analyze and define risks, make decisions based on big data, and dynamically apply a set of Zero Trust policy controls that minimizes risk while creating a productivity-enhancing zero touch work environment.
Disclaimer: By downloading this...
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.
By now, most IT teams have a handle on work-from-home and many are looking ahead to the days when offices will re-open, and users will go back to work. For some, getting the office back up and running is as simple as turning everything back on, but for others, there's lots of work to be done.
In this webinar,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.