SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Stories by George Tsoukas

Story image
What CISOs think about cyber security, visibility and cloud
Wed, 29th Jun 2022
#
digital transformation
#
cloud
#
cybersecurity
Seeking to uncover the minds of CISOs and CIOs across Asia Pacific, my company recently asked Frost & Sullivan to take a snapshot of cloud adoption behaviour in the region.
Story image
Let’s clear the cloud visibility haze with app awareness
Fri, 20th May 2022
#
cloud
#
migration
#
cybersecurity
Increasingly, organisations are heading for the cloud, initiating new born-in-the-cloud architectures and migrating existing applications via ‘lift and shift’ or refactoring.
Story image
Why it's essential to focus on security fundamentals
Wed, 27th Apr 2022
#
dr
#
encryption
#
breach prevention
Recently the U.S. White House released a statement citing intelligence reports indicating "… that the Russian government is exploring options for potential cyber-attacks."
Story image
How to prevent ransomware devastation
Fri, 25th Mar 2022
#
dr
#
ransomware
#
malware
The devastating effects of ransomware have grown over the past two decades from opportunistic to carefully orchestrated attacks.
Story image
Why doubling down on corporate defence works so well
Thu, 3rd Mar 2022
#
uc
#
bi
#
big data
The security operations centre has come a long way since the early 2000s. It wasn’t even called a SOC in those days.
Story image
Why network visibility must be the foundation of Zero Trust architecture
Tue, 25th Jan 2022
#
malware
#
bi
#
big data
In May 2021, U.S. Presidential Executive Order 14028 on improving the nation’s cybersecurity was issued, directing federal agencies to transition to a Zero Trust Architecture (ZTA) as they modernise and move to cloud services.
Story image
Dark clouds on the horizon: How to close the gaps in cloud security
Thu, 2nd Dec 2021
#
cloud
#
bi
#
big data
These days cloud security is more trusted than ever. According to a recent study in a survey of 2,000 IT leaders from around the globe, nearly 85% of respondents said that they trust cloud security practices as much as, or more than, those associated with their on-premises data infrastructures.
Story image
What is OT security and how does it differ from IT security?
Thu, 18th Nov 2021
#
cybersecurity
#
breach prevention
#
it
Let’s consider what OT is, its relationship with IT, and the common problems people experience in working with it.
Story image
What exactly is 5G security, and why is it essential?
Fri, 22nd Oct 2021
#
cybersecurity
#
iot
#
5g
Many things that make 5G so appealing, like the decreased latency and increased bandwidth, are also threats to security.
Story image
How cloud monitoring delivers both challenges and benefits
Tue, 12th Oct 2021
#
bi
#
data analytics
#
martech
To ensure that cloud initiatives are performing to their potential, cloud monitoring takes several different forms. 
Story image
Three ways Shark Week mirrors cybersecurity marketing
Tue, 24th Aug 2021
#
cybersecurity
#
breach prevention
#
gigamon
Here are three ways that myths are spread by Shark Week and how they are analogous to the myths currently percolating in cybersecurity marketing.
Story image
What Is TLS 1.2 — and why should we still care?
Fri, 23rd Jul 2021
#
cybersecurity
#
breach prevention
#
gigamon
Gigamon country manager for ANZ George Tsoukas takes a closer look at the history of cryptographic protocols.
Story image
How multi-cloud visibility ensures business continuity
Mon, 12th Apr 2021
#
ai
#
hybrid cloud
#
multi-cloud
One of the most common applications and use cases that we’ve seen for this capability is tracking the status of SSL/TLS certificates on the thousands of application and communication servers that make up an enterprise network.
Story image
Three security essentials for financial services
Wed, 3rd Mar 2021
#
contact centre
#
devops
#
fintech
Financial services organisations must provide the best possible customer experience in terms of mobile and online application availability, performance and security, writes Gigamon country manager for ANZ George Tsoukas.
Story image
What cloud-native actually means
Fri, 12th Feb 2021
#
cloud
#
devops
#
breach prevention
Although the benefits of the cloud-native approach are widely recognised, there is a lot of confusion about what cloud-native computing is.
Story image
The ins and outs of cloud-native computing
Tue, 24th Nov 2020
#
cloud
#
devops
#
breach prevention
For businesses and other organisations that want to get the most out of their approach to the cloud, cloud-native computing may provide the answer, writes Gigamon country manager for ANZ George Tsoukas.
Story image
Why network monitoring and visibility are key to 5G success
Wed, 28th Oct 2020
#
5g
#
breach prevention
#
wireless networks
Service providers must be prepared to offer unparalleled 5G experiences without compromising on speed, performance or security - all without breaking the bank.
Story image
Why IT and HR must work together to help businesses weather the storm
Thu, 15th Oct 2020
#
malware
#
breach prevention
#
gigamon
Employers are striving to balance team productivity, security and employee engagement. If remote work is the new norm, it’s impossible to ignore the challenging nature of the situation, writes Gigamon manager for ANZ George Tsoukas.
Story image
Network visibility is the crux of security in 2020
Thu, 8th Oct 2020
#
malware
#
vpn
#
cybersecurity
Resilience sits at the heart of security, and there is a need for organisations’ architecture, processes and strategies to be more impervious in order to continue to ensure protection, writes Gigamon ANZ manager George Tsoukas.
Story image
How businesses can lift protection against mobile threats
Mon, 31st Aug 2020
#
smartphones
#
cybersecurity
#
breach prevention
The mobile phone has become ubiquitous both personally and professionally. Many of these devices are able to access corporate networks and sensitive data, yet many may not be as protected or secured as company-owned devices.
Story image
Trust without visibility is blind – Avi Networks
Tue, 14th May 2019
#
malware
#
application security
#
avi networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
Story image
Avi Networks: Using visibility to build trust
Thu, 21st Mar 2019
#
firewall
#
network management
#
network security
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
© 2023 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.