IT Brief Asia - Technology news for CIOs & IT decision-makers

Cybersecurity strategy stories - Page 2

Story image
Nine ways to boost IT security during the summer holidays
Wed, 27th Nov 2019
#
christmas
#
attivo networks
#
cybersecurity strategy
With fewer users to manage, IT teams will likely have more capacity to carry out tasks that might have been overlooked during the busy business year.
Story image
How user-centred design is reshaping cybersecurity
Tue, 12th Nov 2019
#
project management
#
martech
#
multi-cloud
A user-centered design approach starts with users and asking them what they want to gain a deeper understanding of their needs.
Story image
Time to turn the tables on cyber-attackers
Mon, 4th Nov 2019
#
network management
#
network security
#
firewall
Deception tech in cybersecurity mimics wartime strategy to protect Australian firms.
Story image
How to level up Australia’s cybersecurity productivity – CrowdStrike
Wed, 30th Oct 2019
#
it automation
#
ai security
#
ai
The Productivity Bulletin showed that productivity levels in Australia has been declining in key industries since 2013, falling behind global peers.
Story image
Forcepoint increases cloud security presence to cover 128 countries
Thu, 17th Oct 2019
#
endpoint protection
#
cloud security
#
casb
This PoP expansion brings Forcepoint services to virtually anywhere in the world while delivering optimal security and productivity enhancing capabilities.
Story image
Fortune 500 companies failing to demonstrate cybersecurity commitment - Bitglass
Thu, 3rd Oct 2019
#
casb
#
cios
#
report
Bitglass report: 77% of Fortune 500 firms don't indicate who leads cybersecurity.
Story image
Why businesses need a strategy to combat the enemy within – Ping Identity
Wed, 18th Sep 2019
#
compliance
#
retail
#
ping identity
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
Story image
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Tue, 17th Sep 2019
#
network management
#
network security
#
firewall
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
Story image
Board members in ANZ most engaged in cybersecurity – Infosys
Tue, 10th Sep 2019
#
document management
#
ecm
#
martech
The research highlights how cybersecurity is a top priority for organisations in the ANZ market, with boards taking a more hands-on approach to cybersecurity.
Story image
Govt invests $8m into refreshed Cyber Security Strategy
Tue, 2nd Jul 2019
#
nz government
#
cybersecurity strategy
#
cert
The Government has refreshed its approach to New Zealand’s cybersecurity, with more focus on partnerships, funding, and international participation.
Story image
Security risks of neglecting the workforce experience – Avaya
Fri, 28th Jun 2019
#
avaya
#
cybersecurity strategy
#
ux
Government departments and enterprises are wasting millions of dollars every year on cybersecurity because they fail to also invest in the user experience.
Story image
Exclusive: VMware’s challenges and opportunities in cybersecurity
Fri, 14th Jun 2019
#
virtualisation
#
it automation
#
compliance
While it’s still critically important to have a strong perimeter, it is widely accepted now that the status quo of security simply doesn’t work anymore.
Story image
Deakin Uni scores double win with Exabeam partnership
Mon, 20th May 2019
#
big data
#
data analytics
#
bi
Deakin Univ. partners with Exabeam, boosting cybersecurity studies and SIEM prowess.
Story image
General staff don’t get tech jargon - expert says time to ditch it
Thu, 16th May 2019
#
phishing
#
email security
#
cybersecurity
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
Story image
Security professionals want to return fire – Venafi
Wed, 20th Mar 2019
#
devops
#
app development
#
apm
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Story image
How business leaders must prioritise cyber risk - Palo Alto Networks
Wed, 13th Mar 2019
#
firewall
#
network management
#
network security
Prioritising threats ensures organisations are taking a logical approach to cybersecurity, focusing their time and money on the most pressing dangers.
Story image
Flashpoint: Contextual data key to effective security
Mon, 4th Feb 2019
#
big data
#
data analytics
#
bi
Timely, relevant data that has been deeply analysed, contextualised, and presented alongside all details needed is most effective for decision-making.
Story image
LogRhythm: Foster a culture of cybersecurity awareness
Fri, 1st Feb 2019
#
cloud services
#
siem
#
wireless networks
Australian firms' battle against rising cyber threats emphasises culture's role in defence strategy.
Story image
Achieving cyber resilience in the telco industry - Accenture
Mon, 21st Jan 2019
#
ddos
#
devops
#
application security
Four telcos ally in Global Telco Security Alliance to combat rising cyber threats.
Story image
Implementing shared security models in the cloud
Tue, 8th Jan 2019
#
firewall
#
cloud services
#
cloud security
Developers aren’t usually aware of every control that should be implemented to ensure security in cloud environments.
Story image
How protecting critical infrastructure starts with securing social media
Tue, 1st Jan 2019
#
iam
#
cios
#
passwords
Erroneous alerts regarding potential missile strikes that caused civil disruption in Hawaii and Japan in recent history.
Story image
Govt announces cybersecurity grants for SMBs
Mon, 3rd Dec 2018
#
smb
#
grants
#
australian government
Aussie Gov unveils $10m cyber aid for small biz, boosting data security & industry jobs.
Story image
How to configure your firewall for maximum effectiveness
Wed, 14th Nov 2018
#
manageengine
#
cios
#
retail
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Story image
Companies swamped by critical vulnerabilities – Tenable
Fri, 9th Nov 2018
#
tenable network security
#
report
#
cybersecurity strategy
Research has found enterprises identify 870 unique vulnerabilities on internal systems every day, on average, with over 100 of them being critical.