SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

David Shephard stories

David Shephard, a distinguished author and Vice President of Sales for APJ at Illumio, has developed a notable expertise in cloud security, data protection, and regulatory compliance. His writings often explore the intricate balance between maintaining robust security protocols and respecting user privacy, particularly in the context of BYOD (Bring Your Own Device) workplaces and the broader financial services sector.

With a keen interest in technological innovations, David discusses topics ranging from the challenges of multi-cloud security and insider threats to the implications of regulations such as GDPR on data custodianship. His articles provide insights into the emerging threats like 'man in the cloud' attacks and strategies like micro-segmentation technology, illustrating his commitment to advancing cloud security knowledge and practices. Additionally, his engagement with machine learning showcases his forward-thinking approach to securing corporate data in a rapidly evolving digital landscape.

Gettyimages 674522062

Illumio signs on Spectrum as first New Zealand channel partner

Tue, 6th Apr 2021
Illumio partners with Spectrum to integrate micro-segmentation tech into managed services for enterprise organisations in New Zealand.
Gettyimages 1166334015

How to defend cloud environments against insider threats

Thu, 2nd Apr 2020
Let’s discuss the main types of insider threats facing businesses today and explain how to mitigate their risks through various technologies.
Gettyimages 1051594028

Cloud security planning – here’s to a safer future

Fri, 21st Feb 2020
Discussion is likely to focus on cloud security, with IT professionals asking themselves: How did we cope with the threat situation last year?.
Gettyimages 914952168

Machine learning is key to securing corporate data in the cloud

Mon, 3rd Feb 2020
In securing data in the cloud, companies now face a multi-faceted challenge that features flexible data access from large numbers of users and devices.
Cybersecurity35

Protecting organisations from insider threats - Bitglass

Fri, 5th Jul 2019
The biggest challenge for most external threat actors is gaining access to a target organisation, but insider threats already have this.
Gettyimages 962404026

How to overcome the multi-cloud security challenge

Mon, 1st Apr 2019
More organisations are adopting multi-cloud strategies to reduce the risk of stoppages and increase flexibility. But security remains a concern.
Screen shot 2019 02 28 at 2

Beware of the 'man in the cloud'

Fri, 1st Mar 2019
Bitglass AU's David Shephard discusses the 'man in the cloud' attacks that are becoming increasingly popular - and effective.
Cryptojacking

CSOs - are you prepared for cloud cryptojacking?

Mon, 18th Feb 2019
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Endpoint security

Achieving uncompromising security without compromising privacy

Fri, 1st Feb 2019
Navigating the BYOD era, companies must balance robust security measures with user privacy, steering away from invasive MDM to agentless solutions.
Thinkstockphotos 470368858

Developing a one-two punch for cloud security

Tue, 17th Jul 2018
When data is regularly accessed from a myriad of devices outside the corporate firewall, strategies to maintain effective security have to evolve.
Thinkstockphotos 971610364

GDPR, changing what it means to be a good data custodian

Tue, 19th Jun 2018
As GDPR compliance takes effect, businesses face scrutiny over data usage, revealing lapses and redefining what it means to be a good data custodian.
Thinkstockphotos 953906904

Securing cloud platforms in the financial services sector

Mon, 21st May 2018
Organisations in the financial services sector are faced with a unique set of challenges when it comes to IT security.
Thinkstockphotos 590608096

Achieving better security for BYOD workplaces

Fri, 2nd Mar 2018
The rise of BYOD lets employees work from anywhere on personal devices but challenges IT to secure diverse endpoints, pushing for data-centric solutions.