IT Brief Asia - Technology news for CIOs & IT decision-makers

Cybersecurity strategy stories - Page 7

Devices

Is BYOD an expensive mistake for your business?

Wed, 22nd Aug 2018
#
byod
#
mobility
#
wavelink
Although BYOD can seem like a cost-effective mobility solution, experts warn it might backfire due to security, productivity, and cost concerns.
Nick savvides

Exclusive: MSSPs enabling holistic cybersecurity approach

Fri, 17th Aug 2018
#
symantec
#
mssp
#
cybersecurity strategy
Companies are increasingly relying on managed security service providers to protect themselves from sophisticated threats.
Ai2

Bringing a gun to a gunfight: Countering AI-enabled threats

Tue, 14th Aug 2018
#
siem
#
socs
#
ueba
Artificial intelligence can reduce human effort and lower the time needed to detect, respond to, and recover from cybersecurity incidents.
Eddie habibi bio

Exclusive: How nation-state attacks impact businesses

Mon, 13th Aug 2018
#
cyber attacks
#
cybersecurity strategy
#
nation state attacks
With tensions between global superpowers rising, cyber attacks have become a new frontier for governments to gain an advantage over one another.
Fallback

Exclusive: Cloud and blockchain threats creating new channel opportunities

Tue, 31st Jul 2018
#
blockchain
#
casb
#
cybersecurity
While blockchain technology isn't at the same maturity stage as cloud, the channel should start ramping up their security capabilities in that space.
Threat detection

Make the pre-emptive strike against cyberattacks with threat hunting

Mon, 23rd Jul 2018
#
firewalls
#
network infrastructure
#
network security
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Cyber attack   global

Cost of cyber attacks up 62% in five years - report

Tue, 3rd Jul 2018
#
accenture
#
study
#
ponemon institute
Cyber attacks are costing businesses more than ever, with a global average of USD $11.7 million per organisation, up 62% in five years, says a new report.
Spending

Spending on AI cybersecurity solutions to increase – GlobalData

Mon, 2nd Jul 2018
#
it budget
#
report
#
globaldata
While cybersecurity has now become a critical business function, it remains a non-core competence for a significant number of boards.
Committee

SailPoint forms board-level committee to drive cyber risk resiliency

Wed, 27th Jun 2018
#
healthtech
#
sailpoint
#
cybersecurity strategy
SailPoint forms Cybersecurity Committee to enhance company's security posture and address rising cyber threats, with a board-level focus on risk.
Thinkstockphotos 658516626

Singapore firms suffer cybersecurity inertia as attacks take heavy toll

Mon, 5th Mar 2018
#
devops
#
pam
#
apm
Despite Singapore's technological advancements, research from CyberArk reveals 38% of firms rarely update their security strategies even after cyber attacks.
Travel

How to mitigate cyber risks while travelling

Tue, 9th Jan 2018
#
wireless networks
#
cloud services
#
credit card fraud
Over the past year, compromises of payment card data, network intrusions, and cyberattacks using hotel Wi-Fi have plagued the hospitality industry.
Untitled

CISOs face an uphill battle when rolling out comprehensive security

Wed, 27th Sep 2017
#
breach prevention
#
cybersecurity
#
data breach
The CISO's role is crucial to the rollout of organisation-wide IT security strategies, but they still have an uphill battle to fight.
Thinkstockphotos 636198644

Four key steps to improving your cyber defence capabilities

Thu, 17th Aug 2017
#
data protection
#
breach prevention
#
cybersecurity
IT professionals suffering from breach fatigue must rethink cyber security strategies and focus on cyber defence.
Thinkstockphotos 519360670a

UXC: Australia's Cyber Security Strategy a great leap forward

Wed, 11th May 2016
#
risk & compliance
#
cybersecurity
#
uxc
Australia's new Cyber Security Strategy aims to address shortages in skilled professionals & promote cultural change.
Fallback

Locking the bathroom window

Sat, 1st May 2010
#
firewalls
#
data protection
#
network infrastructure
Endpoint security is crucial. Like securing bathroom windows in a house, neglecting PoS terminals and embedded devices leaves your network exposed.