SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Cybersecurity strategy stories - Page 6

Big data1

Flashpoint: Contextual data key to effective security

Mon, 4th Feb 2019
#
data analytics
#
martech
#
planning
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
Telecomms3

Achieving cyber resilience in the telco industry - Accenture

Mon, 21st Jan 2019
#
uc
#
ddos
#
devops
With hacking attempts surging, Singtel, SoftBank, Etisalat, and Telefónica have formed the Global Telco Security Alliance to bolster global cybersecurity.
Cloud10

Implementing shared security models in the cloud

Tue, 8th Jan 2019
#
firewalls
#
cloud security
#
application security
Developers aren't usually aware of every control that should be implemented to ensure security in cloud environments.
Cyber attack   global

How protecting critical infrastructure starts with securing social media

Tue, 1st Jan 2019
#
iam
#
cybersecurity
#
passwords
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Thinkstockphotos 929002810

How to configure your firewall for maximum effectiveness

Wed, 14th Nov 2018
#
manageengine
#
opinion
#
cybersecurity strategy
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Cyber attacker2

Companies swamped by critical vulnerabilities – Tenable

Fri, 9th Nov 2018
#
report
#
cybersecurity strategy
#
tenable
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.
Unified coms

Don't let your network outgrow your IT team

Thu, 8th Nov 2018
#
network infrastructure
#
sdn
#
naas
Growing complexity in business networks can overwhelm IT teams. Pruning back complexity and increasing visibility can help IT teams stay in control.
Cyber attack   global

Combatting the rise of Cybercrime-as-a-Service

Wed, 7th Nov 2018
#
malware
#
breach prevention
#
wireless networks
Amateur cybercriminals (or anyone with a grudge), can execute spam attacks, steal people's identities, and more.
Cloud security4

Securing your cloud data: Point solutions vs single pane of glass

Mon, 5th Nov 2018
#
edutech
#
cloud security
#
casb
Organisations that can use fewer security products that individually offer more capability are likely to have a lower total cost of ownership.
Cybersecurity9

The key pillars of strong cybersecurity strategies

Fri, 2nd Nov 2018
#
devops
#
multi-cloud
#
iam
A cybersecurity strategy is imperative for a mature security presence in order to improve the chances of surviving current and future cyberattacks.
Cybersecurity breach2

LogRhythm reports higher-than-anticipated SOAR adoption rate

Thu, 1st Nov 2018
#
siem
#
logrhythm
#
cybersecurity strategy
LogRhythm sees a significant surge as 33% of customers adopt its SOAR capabilities, outpacing Gartner's 2018 SOAR adoption estimates.
Industrial

More OT devices added to Tenable's industrial security offering

Fri, 19th Oct 2018
#
cybersecurity strategy
#
security week
#
ot
Tenable has expanded its asset discovery and vulnerability management solution to include thousands of new OT devices, enhancing industrial security.
Gdpr3


GDPR compliance: Looking beyond the hype

Wed, 17th Oct 2018
#
data protection
#
data privacy
#
opinion
Six months post-GDPR, we demystify compliance myths and provide key insights to navigate the data regulation maze.
Cybersecurity8

Trend Micro's four pillars of cybersecurity strategy

Thu, 11th Oct 2018
#
cloud security
#
risk & compliance
#
ai
There are steps that businesses can and should take to protect their data systems – and the privacy of their customers.
Oil refinery

Industrial control systems: How to approach OT cybersecurity

Tue, 9th Oct 2018
#
risk & compliance
#
opinion
#
cybersecurity strategy
To secure facilities, operational technology and IT security must come together. PAS Global spoke to industry experts for their strategies.
Bunker

Carbon Black: Is your cyber panic room ready?

Fri, 5th Oct 2018
#
carbon black
#
opinion
#
cybersecurity strategy
Cybersecurity expert warns of a 'cyber winter' with a surge in destructive attacks, urging digital 'panic rooms'.
Dell emc

Cybersecurity for dummies: How to minimise the risk of data loss

Mon, 24th Sep 2018
#
kaspersky
#
cybersecurity strategy
#
kaspersky cyber security weekend
Amid rising cyber threats and costly data breaches, Kaspersky Lab advises enhanced cyber hygiene to safeguard valuable digital assets.
Aii

APAC ahead of US and EMEA in AI security adoption - Osterman

Wed, 29th Aug 2018
#
firewalls
#
network infrastructure
#
network security
Companies realise they need to improve the way they manage security and policy, and they also realise that automating workflows and processes is key.
Ben desjardins

Exclusive interview: RSA on the road to AI security

Mon, 27th Aug 2018
#
ai
#
ml
#
rsa security
Organisations are now capable of leveraging AI as its advanced to the point of addressing critical issues in cybersecurity.
Fallback

Data protection overlooked in race for digital transformation - IDC

Fri, 24th Aug 2018
#
edutech
#
digital transformation
#
cloud security
Only with resilient operations can businesses mitigate the risk of downtime and focus on projects that drive transformation.