Cybersecurity strategy stories - Page 2
![Story image](../../../../../uploads/story/2021/11/12/preview_GettyImages-181549536__1_.webp)
Divide between IT and OT teams hindering unified cybersecurity strategies
Fri, 12th Nov 2021
#
cybersecurity
#
ponemon institute
#
cybersecurity strategy
Organizations are hindered by a cultural divide between IT and OT teams, preventing a unified cybersecurity strategy, a report from Dragos has found.
![Story image](../../../../../uploads/story/2021/11/01/preview_GettyImages-1210917404.webp)
Appgate launches latest version of zero trust network access solution
Mon, 1st Nov 2021
#
malware
#
cybersecurity
#
cybersecurity strategy
Appgate launches new version of zero trust network access solution, offering enhanced capabilities for enterprises.
![Story image](../../../../../uploads/story/2021/09/30/preview_GettyImages-1282585696.webp)
Ping Identity acquires Singular Key, extends no-code functionality
Thu, 30th Sep 2021
#
malware
#
devops
#
it automation
Ping Identity has acquired no-code identity specialist Singular Key to streamline integration of identity services.
![Story image](../../../../../uploads/story/2021/06/29/preview_GettyImages-892701338.webp)
Traditional solutions fail to secure organisations against today's malware
Tue, 29th Jun 2021
#
firewalls
#
network infrastructure
#
malware
Traditional anti-malware solutions miss nearly 75% of threats, according to new research from WatchGuard Technologies.
![Story image](../../../../../uploads/story/2020/10/28/preview_GettyImages-1169999045.webp)
How to address cyber-threats as a strategic risk
Thu, 29th Oct 2020
#
cybersecurity
#
cybersafety
#
cybersecurity strategy
Cybersecurity should be a priority discussion point for business leaders, as point solutions and incomplete approaches create vulnerabilities.
![Story image](../../../../../uploads/story/2019/12/17/preview_cyber_warfare.webp)
Companies not utilising threat hunters correctly – study
Tue, 17th Dec 2019
#
advanced persistent threat protection
#
cyber threats
#
study
ThreatQuotient study reveals confusion over the role of threat hunters, with many teams focusing on reactive processes.
![Story image](../../../../../uploads/story/2019/12/16/preview_cybersecurity26.webp)
75% of DevOps professionals say certificate issuance policies slow them down
Mon, 16th Dec 2019
#
devops
#
apm
#
software development
Less than half of DevOps professionals believe developers always request certificates that serve as machine identities through authorised channels.
![Story image](../../../../../uploads/story/2019/12/06/preview_cybersecurity51.webp)
Organisations still not getting cybersecurity fundamentals right - Wavelink
Fri, 6th Dec 2019
#
wavelink
#
mfa
#
patching
Many organisations fail at basic cybersecurity, relying solely on advanced tools. Wavelink highlights the vital need for timely patches and employee training.
![Story image](../../../../../uploads/story/2019/12/03/preview_Screen_Shot_2019-12-03_at_10.webp)
AiSP launches ladies in cybersecurity mentorship programme
Tue, 3rd Dec 2019
#
women in technology
#
association of information security professionals
#
cybersecurity strategy
AiSP launches mentorship programme to groom female cybersecurity professionals in Singapore, addressing talent shortage.
![Story image](../../../../../uploads/story/2019/12/02/preview_cybersecurity35.webp)
Business security performance impacting bottom line - Thycotic
Mon, 2nd Dec 2019
#
pam
#
apm
#
software development
When cybersecurity teams do not meet their targets, it impacts the CEO with longer hours, job insecurity, shareholder pushback, and bonus reductions.
![Story image](../../../../../uploads/story/2019/11/27/preview_47a.webp)
Nine ways to boost IT security during the summer holidays
Wed, 27th Nov 2019
#
christmas
#
attivo networks
#
cybersecurity strategy
With fewer users to manage, IT teams will likely have more capacity to carry out tasks that might have been overlooked during the busy business year.
![Story image](../../../../../uploads/story/2019/11/12/preview_cybersecurity25.webp)
How user-centred design is reshaping cybersecurity
Tue, 12th Nov 2019
#
devops
#
martech
#
multi-cloud
A user-centered design approach starts with users and asking them what they want to gain a deeper understanding of their needs.
![Story image](../../../../../uploads/story/2019/11/04/preview_38.webp)
Time to turn the tables on cyber-attackers
Mon, 4th Nov 2019
#
network infrastructure
#
firewalls
#
network security
Australian businesses are adopting deception technology to counter cyber-attacks, mimicking attackers' tricks to safeguard critical systems and customer data.
![Story image](../../../../../uploads/story/2019/10/30/preview_cybersecurity40.webp)
How to level up Australia’s cybersecurity productivity – CrowdStrike
Wed, 30th Oct 2019
#
it automation
#
ai security
#
ai
The Productivity Bulletin showed that productivity levels in Australia has been declining in key industries since 2013, falling behind global peers.
![Story image](../../../../../uploads/story/2019/10/17/preview_digital_globe11.webp)
Forcepoint increases cloud security presence to cover 128 countries
Thu, 17th Oct 2019
#
cloud security
#
endpoint protection
#
casb
This PoP expansion brings Forcepoint services to virtually anywhere in the world while delivering optimal security and productivity enhancing capabilities.
![Story image](../../../../../uploads/story/2019/10/03/preview_cybersecurity24.webp)
Fortune 500 companies failing to demonstrate cybersecurity commitment - Bitglass
Thu, 3rd Oct 2019
#
casb
#
report
#
bitglass
A Bitglass report reveals that 77% of Fortune 500 companies lack transparency in cybersecurity roles, with just 62% having a Chief Information Security Officer.
![Story image](../../../../../uploads/story/2019/09/18/preview_MarkPerry.webp)
Why businesses need a strategy to combat the enemy within – Ping Identity
Wed, 18th Sep 2019
#
risk & compliance
#
cybersecurity strategy
#
insider threats
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
![Story image](../../../../../uploads/story/2019/09/17/preview_sinclair1.webp)
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Tue, 17th Sep 2019
#
network infrastructure
#
firewalls
#
network security
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.
![Story image](../../../../../uploads/story/2019/09/10/preview_cybersecurity26.webp)
Board members in ANZ most engaged in cybersecurity – Infosys
Tue, 10th Sep 2019
#
document management
#
ecm
#
martech
The research highlights how cybersecurity is a top priority for organisations in the ANZ market, with boards taking a more hands-on approach to cybersecurity.
![Story image](../../../../../uploads/story/2019/07/02/preview_GettyImages-1137788912.webp)
Govt invests $8m into refreshed Cyber Security Strategy
Tue, 2nd Jul 2019
#
nz government
#
cybersecurity strategy
#
cert
The Government has refreshed its approach to New Zealand’s cybersecurity, with more focus on partnerships, funding, and international participation.