SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Steve Hunter stories

Story image
New edge vulnerability revealed by Forescout
Wed, 9th Dec 2020
#
iot security
#
iot
#
edge security
AMNESIA:33 is a set of 33 memory-corrupting vulnerabilities affecting four open source TCP/IP stacks: uIP; FNET; picoTCP; and Nut/Net.
Story image
Why zero trust could fail due to lack of understanding‚Äč, not technology
Tue, 20th Oct 2020
#
malware
#
iot security
#
cybersecurity
Distributed workforces are becoming the norm, but implementing a zero trust security model requires understanding and knowledge.
Story image
The five business benefits of a zero trust approach to security
Wed, 19th Aug 2020
#
malware
#
iot security
#
cybersecurity
Pandemic accelerates shift to 'zero trust' to combat digital workplace cybersecurity risks.
Story image
Four tips for organisations to help future-proof their OT security strategy
Tue, 19th May 2020
#
iot security
#
cybersecurity
#
convergence
OT security market faces major overhaul, shift towards strategic partnerships essential for future-proofing.
Story image
Embracing zero trust for IoT and OT: a fundamental mind shift
Thu, 23rd Apr 2020
#
ddos
#
iot security
#
cybersecurity
Remote working has become common practice, but it brings new security challenges. Forescout outlines four considerations for a zero trust architecture.
Story image
Five questions organisations should ask when evaluating an asset management solution
Wed, 25th Mar 2020
#
iot security
#
cybersecurity
#
forescout technologies
In 2020, robust asset visibility is key for business cybersecurity, amid budgetary constraints.
Story image
Key considerations for consistent IoT manageability and security
Mon, 20th Jan 2020
#
byod
#
mobility
#
iot security
IoT's expansion in our lives raises security risks, prompting urgent need for firm management strategies.
Story image
Are organisations ready for Zero Trust?
Mon, 25th Nov 2019
#
firewall
#
malware
#
network management
Despite its clear benefits, very few organisations have turned the concept of Zero Trust into a security practice, Forescout finds.