Story image

Whitepaper: What is cybercrime doing closer to home?

18 Jan 2018

‘Inevitable’ is a common word assigned to cybercrime in today’s times.

Cyber attackers are employing some of the most sophisticated attack techniques that are harder to detect and mitigate, emboldened by the fact that they cannot be prosecuted easily especially when the breach is conducted remotely.

And this is concerning, as many organisations are now becoming risk averse to adopting digital transformation to safeguard against these attacks, making them less competitive and more vulnerable to threats.

But what’s the cybersecurity landscape like closer to home? To answer that question, LogRhythm has released a whitepaper from Frost & Sullivan that delves into cybersecurity maturity in Asia Pacific (APAC).

The comprehensive study garners insights on what specific APAC countries are the most cyber mature, as well as introducing the Frost & Sullivan Cyber Resilience Framework to help enterprises put into place the requirements for attaining the status of a resilient business.

Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
How to avoid becoming a cryptojacking victim - Bitglass
Large-scale cryptojacking is a lucrative business due to the popularity and value of cryptocurrencies like Bitcoin and Ethereum.
Symantec, Ixia combine efforts to secure hybrid networks
Ixia’s CloudLens and Symantec Security Analytics now feature complete integration, which allows Symantec customers to gain real-time visibility into their hybrid cloud environments.