IT Brief Asia - Technology news for CIOs & IT decision-makers

Stories that mention Steve Hunter

Story image
New edge vulnerability revealed by Forescout
Wed, 9th Dec 2020
#
iot security
#
iot
#
edge security
AMNESIA:33 is a set of 33 memory-corrupting vulnerabilities affecting four open source TCP/IP stacks: uIP; FNET; picoTCP; and Nut/Net.
Story image
Why zero trust could fail due to lack of understanding‚Äč, not technology
Tue, 20th Oct 2020
#
malware
#
iot security
#
cybersecurity
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.
Story image
The five business benefits of a zero trust approach to security
Wed, 19th Aug 2020
#
malware
#
iot security
#
cybersecurity
Security architects need to re-examine the concept of identity in their organisation, and many are now turning to a zero trust security model to protect sensitive resources.  
Story image
Four tips for organisations to help future-proof their OT security strategy
Tue, 19th May 2020
#
iot security
#
cybersecurity
#
convergence
IT and OT networks are founded on different and often conflicting priorities, making IT-OT security challenging for businesses. Only when the needs of both environments are thoroughly understood can digital convergence be successful.
Story image
Embracing zero trust for IoT and OT: a fundamental mind shift
Thu, 23rd Apr 2020
#
ddos
#
iot security
#
cybersecurity
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture in protecting their sensitive resources.
Story image
Five questions organisations should ask when evaluating an asset management solution
Wed, 25th Mar 2020
#
iot security
#
cybersecurity
#
forescout technologies
Asset management solutions are imperative for business security, and choosing the right solution that is tailored to business requirements, will determine its success.
Story image
Key considerations for consistent IoT manageability and security
Mon, 20th Jan 2020
#
byod
#
mobility
#
iot security
To address the risks connected IoT devices pose, it is important organisations come up with a strategy that will ensure every device is monitored and managed, Forescout says.
Story image
Are organisations ready for Zero Trust?
Mon, 25th Nov 2019
#
firewall
#
malware
#
network management
Despite its clear benefits, very few organisations have turned the concept of Zero Trust into a security practice, Forescout finds.
© 2023 TechDay, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.