SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Cybersecurity strategy stories - Page 3

Story image
How to configure your firewall for maximum effectiveness
Wed, 14th Nov 2018
#
manageengine
#
cios
#
cybersecurity strategy
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Story image
Companies swamped by critical vulnerabilities – Tenable
Fri, 9th Nov 2018
#
tenable network security
#
report
#
cybersecurity strategy
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Story image
Don’t let your network outgrow your IT team
Thu, 8th Nov 2018
#
network infrastructure
#
network management
#
sdn
Growing complexity in business networks can overwhelm IT teams. Pruning back complexity and increasing visibility can help IT teams stay in control.
Story image
Combatting the rise of Cybercrime-as-a-Service
Wed, 7th Nov 2018
#
malware
#
cloud services
#
gdpr
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people’s identities, and more.
Story image
Securing your cloud data: Point solutions vs single pane of glass
Mon, 5th Nov 2018
#
cloud security
#
casb
#
forcepoint
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
Story image
The key pillars of strong cybersecurity strategies
Fri, 2nd Nov 2018
#
devops
#
cloud services
#
app development
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
Story image
LogRhythm reports higher-than-anticipated SOAR adoption rate
Thu, 1st Nov 2018
#
siem
#
cybersecurity strategy
#
logrhythm
33% of LogRhythm clients adopt SOAR, outpacing '18 Gartner estimates.
Story image
More OT devices added to Tenable's industrial security offering
Fri, 19th Oct 2018
#
tenable network security
#
cybersecurity strategy
#
security week
Tenable boosts OT security with enhanced device coverage to thwart growing cyber threats.
Story image

GDPR compliance: Looking beyond the hype
Wed, 17th Oct 2018
#
data protection
#
gdpr
#
rubrik
Six months post-GDPR, we demystify compliance myths and provide key insights to navigate the data regulation maze.
Story image
Exclusive: Cybersecurity in the API economy
Mon, 15th Oct 2018
#
okta
#
api management
#
cybersecurity strategy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
Story image
Trend Micro’s four pillars of cybersecurity strategy
Thu, 11th Oct 2018
#
cloud services
#
cloud security
#
ai
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Story image
Industrial control systems: How to approach OT cybersecurity
Tue, 9th Oct 2018
#
cybersecurity strategy
#
pas global
#
security week
To secure facilities, operational technology and IT security must come together. PAS Global spoke to industry experts for their strategies.
Story image
Carbon Black: Is your cyber panic room ready?
Fri, 5th Oct 2018
#
carbon black
#
opinion
#
cybersecurity strategy
Cybersecurity expert warns of a 'cyber winter' with a surge in destructive attacks, urging digital 'panic rooms'.
Story image
Cybersecurity for dummies: How to minimise the risk of data loss
Mon, 24th Sep 2018
#
kaspersky
#
cybersecurity strategy
#
kaspersky cyber security weekend
Kaspersky Lab highlights crucial cyber hygiene to shield valuable digital assets from rising online threats.
Story image
Exclusive: Aura on designing a secure IT infrastructure
Mon, 17th Sep 2018
#
application security
#
devsecops
#
aura information security
Cybersecurity still an afterthought in Aussie firms, despite high risks of cyber attacks, warns expert.
Story image
Aus companies must build security expertise to develop cyber resilience
Fri, 14th Sep 2018
#
ai
#
ueba
#
cybersecurity strategy
Australian firms fight doubled cyber threats, 80% blocked yet breaches persist.
Story image
APAC ahead of US and EMEA in AI security adoption - Osterman
Wed, 29th Aug 2018
#
network management
#
network security
#
firewall
Companies realise they need to improve the way they manage security and policy, and they also realise that automating workflows and processes is key.
Story image
Exclusive interview: RSA on the road to AI security
Mon, 27th Aug 2018
#
ml
#
ai
#
rsa security
Organisations are now capable of leveraging AI as its advanced to the point of addressing critical issues in cybersecurity.
Story image
Data protection overlooked in race for digital transformation - IDC
Fri, 24th Aug 2018
#
cloud security
#
digital transformation
#
zerto
Only with resilient operations can businesses mitigate the risk of downtime and focus on projects that drive transformation.
Story image
Is BYOD an expensive mistake for your business?
Wed, 22nd Aug 2018
#
byod
#
mobility
#
wavelink
BYOD pitfalls: Firms warned of high costs and security risks embracing personal device use at work.
Story image
Exclusive: MSSPs enabling holistic cybersecurity approach
Fri, 17th Aug 2018
#
symantec
#
mssp
#
cybersecurity strategy
Companies are increasingly relying on managed security service providers to protect themselves from sophisticated threats.
Story image
Bringing a gun to a gunfight: Countering AI-enabled threats
Tue, 14th Aug 2018
#
siem
#
soc
#
ueba
Artificial intelligence can reduce human effort and lower the time needed to detect, respond to, and recover from cybersecurity incidents.
Story image
Exclusive: How nation-state attacks impact businesses
Mon, 13th Aug 2018
#
cybersecurity strategy
#
nation state attacks
#
pas global
With tensions between global superpowers rising, cyber attacks have become a new frontier for governments to gain an advantage over one another.
Story image
Exclusive: Cloud and blockchain threats creating new channel opportunities
Tue, 31st Jul 2018
#
blockchain
#
casb
#
cybersecurity
While blockchain technology isn’t at the same maturity stage as cloud, the channel should start ramping up their security capabilities in that space.