SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Cybersafety stories - Page 8

Story image
Video: 10 Minute IT Jams - Who is StorageCraft?
Wed, 4th Nov 2020
#
cloud services
#
dr
#
partner programmes
StorageCraft: a cybersecurity company providing data protection and backup solutions - TechDay interviews senior director Florian Malecki.
Story image
SASE: The new wave of securing the enterprise
Tue, 3rd Nov 2020
#
casb
#
dlp
#
sase
Legacy network security solutions built around on-premises architectures cannot support the evolving demands placed on IT, writes Bitglass CTO Anurag Kahol.
Story image
Video: 10 Minute IT Jams - SonicWall VP discusses the importance of endpoint security
Thu, 29th Oct 2020
#
wfh
#
cybersecurity
#
sonicwall
SonicWall's Dmitriy Ayrapetov returns to discuss the risks of remote working and how to secure distributed networks.
Story image
How to address cyber-threats as a strategic risk
Thu, 29th Oct 2020
#
cybersecurity
#
cybersafety
#
cybersecurity strategy
Cybersecurity should be a priority discussion point for business leaders, as point solutions and incomplete approaches create vulnerabilities.
Story image
Women in cybersecurity – what is holding us back?
Thu, 29th Oct 2020
#
cybersecurity
#
women in technology
#
cybersafety
Women are severely under-represented in the cybersecurity industry in the ANZ region, according to figures released by ASIAL.
Story image
The business case for an in-house ethical hacker
Wed, 28th Oct 2020
#
cybersecurity
#
cybersafety
#
cios
The demand for ethical hackers is rising as cyber-attacks increase. Employing an in-house ethical hacker can save costs and improve security.
Story image
The rising threat of human-controlled ransomware
Tue, 27th Oct 2020
#
ransomware
#
malware
#
cybersecurity
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for ANZ Jim Cook.
Story image
Video: 10 Minute IT Jams - Who is LogRhythm?
Thu, 22nd Oct 2020
#
siem
#
cybersecurity
#
logrhythm
LogRhythm: cybersecurity firm excelling in behaviour analytics and automation, with a focus on the Asia-Pacific market.
Story image
Insider threat report reveals deception in the workforce
Wed, 21st Oct 2020
#
cybersecurity
#
cios
#
insider threats
Insider threats are costing businesses up to $2 million per attack, with brand reputation and disruption to operations being major consequences.
Story image
Why zero trust could fail due to lack of understanding​, not technology
Tue, 20th Oct 2020
#
malware
#
iot security
#
cybersecurity
Distributed workforces are becoming the norm, but implementing a zero trust security model requires understanding and knowledge.
Story image
Creating private data regulations for employees
Tue, 20th Oct 2020
#
data protection
#
cybersecurity
#
cybersafety
Data breaches are on the rise, with employees being the weakest link. Organisations should establish private data regulations to combat this.
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Tue, 20th Oct 2020
#
microsoft
#
phishing
#
email security
Microsoft is the most imitated brand in phishing campaigns, accounting for 19% of all brand phishing attempts in Q3, according to Check Point Research.
Story image
How cyber-attackers use Microsoft 365 tools to steal data
Fri, 16th Oct 2020
#
microsoft
#
cybersecurity
#
cios
Vectra security research has recently identified how cyber-attackers use Microsoft Office 365 tools against organisations to steal data and take over accounts.
Story image
Research: Younger cybersecurity pros more fearful of being replaced by AI
Fri, 16th Oct 2020
#
cybersecurity
#
salaries
#
cybersafety
Young cybersecurity pros fear AI job threat, older peers unfazed—Exabeam study reveals generational split.
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
Thu, 15th Oct 2020
#
casb
#
dlp
#
cybersecurity
TechDay's 10 Minute IT Jams features Forcepoint's sales engineer Matthew Bant, discussing their DLP solution and people-centered cybersecurity strategies.
Story image
Zoom to begin rolling out end-to-end encryption
Thu, 15th Oct 2020
#
encryption
#
cybersecurity
#
zoom
Zoom begins technical preview of end-to-end encryption for free and paid users, in a move to strengthen security.
Story image
Why best-practice threat data management provides confident automation
Tue, 13th Oct 2020
#
advanced persistent threat protection
#
cybersecurity
#
threatquotient
Understanding an organization's threat landscape requires the right data sources and prioritization for actionable intelligence.
Story image
Report: Power utilities increasingly at risk of devastating cyber-attacks
Fri, 9th Oct 2020
#
iot
#
cybersecurity
#
cybersafety
Power utility sector faces increasing cyber-attack risk due to remote systems and understaffed facilities, says GlobalData.
Story image
Video: 10 Minute IT Jams – A glimpse inside a ransomware cell
Fri, 9th Oct 2020
#
malware
#
ransomware
#
cybersecurity
SonicWall's Brook Chelmo shares his eye-opening experience with a ransomware cell in TechDay's latest IT Jam. #Cybersecurity #Ransomware.
Story image
Dark web monitoring and how it can help protect online identities
Fri, 9th Oct 2020
#
dark web
#
physical security
#
cybersecurity
Identity theft affects 1 in 6 New Zealanders, with personal information often traded on the dark web. Learn how to protect against it.
Story image
Securing SAP to ensure better operational security
Thu, 8th Oct 2020
#
cybersecurity
#
sap
#
cybersafety
Australian government warns of growing cybercrime threat; organisations' intellectual property and financial information at risk.
Story image
Network visibility is the crux of security in 2020
Thu, 8th Oct 2020
#
vpn
#
malware
#
cybersecurity
Pandemic remote working surge in Asia Pacific ups cyber risks; firms eye robust security strategies.
Story image
Video: 10 Minute IT Jams - Security expert discusses changing cyber-attacker behaviour
Wed, 7th Oct 2020
#
cybersecurity
#
sonicwall
#
cybersafety
SonicWall's Brook Chelmo reveals changing cyber-attacker behaviour and best practices for CISOs in new TechDay IT Jam.
Story image
Why zero trust remote networking is key to thriving in the ‘new normal’ business world
Wed, 7th Oct 2020
#
malware
#
mobility
#
byod
The shift to remote working has highlighted the need for secure infrastructure. Zero trust remote work can provide the solution.