Fortinet's annual Security Census 2015 reports that APJ CISOs faced major vulnerabilities in 2015 via unsecured wireless networks. Experts advise on protection methods for wireless networks.
In a constantly changing threat landscape, how do practitioners decide which investments will help get the best security? Juniper's Sajan Paul shares key insight from a new RAND Study on the subject.
By 2018, Javelin predicts that new account fraud and account takeover will eclipse present worries about POS attacks and retail breaches. Why breached PII should be our biggest worry.
In the face of advanced threats, security leaders must first understand their attackers' strategies and tactics. Jim Jaeger of Fidelis offers keen security insight into new security tools and methods.
There is no stopping innovation and technology adoption - especially in developing markets. Experts from Blue Coat Systems tell how enterprises can understand risks and ensure security along the way.
A new breach reported by Heartland Payment Systems won't get much attention. But this incident could be more damaging to the undisclosed number of consumers affected than was Heartland's 2008 payment card breach.
Mobile app-based ecommerce is surging forward in India's smartphone-saturated market. After Meru Cabs' data exposure earlier in May, security experts analyze legal liability, secure development & incident response.
Dick Williams, CEO of digital security firm Webroot, says the cybersecurity profession needs more than just technical experts. Learn why he says firms will seek out those who can understand the behaviors of cyber-attackers.
As security threats have evolved, organizations have deployed layers of security controls. How can leaders address the vulnerabilities within these incremental controls? Juniper's Paul shares insight.
When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Is the Information Assurance practice helping Qatar's security leaders manage risks and security better? QCERT's Ashraf Ali Ismael shares insights on how security leaders are embracing the IA concept.
The banking sector in the Middle East region faces growing challenges from phishing attacks and APTs. Banque Saudi Fransi's Osman asks: Have CISOs learned their lessons and made adjustments after past attacks?
What are some of the unique security challenges facing Asian organizations, and how can they meet them? Steve Durbin of the global Information Security Forum shares insight from new research.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.