<
>

Cyberthreats Education Institutes Must Guard Against

Authored by: Sumit Bansal, Senior Director of ASEAN and Korea at Sophos.   While the intention of all students receiving a personal laptop is excellent, it’s important to know that educational institutions hold...

Cyber Hygiene - Best Practices For Employees

Authored by: Aaron Zander, Head of IT at HackerOne   Use a good password manager. Don’t share logins and passwords unless you absolutely have to. If you have to, then it’s time to invest in a password...

New Google Android Malware Warning Issued To 8 Million Play Store Users

Authored by: Kate O'Flaherty, freelance cybersecurity journalist Google’s Android Play Store is increasingly under fire for allowing malware ridden apps to plague its users. But another warning has been issued...

Keep Your Job After a Cyberattack

By: Susan Moore, Director, Public Relations (Asia Pacific) 8 reasons why more CEOs will be fired over cybersecurity breaches — and how to prevent it. The theft of private data on 143 million Americans made...

New Research: What Blockchain Means For Advertisers

Authors: Joanna O'Connell, Vice President, Principal Analyst, Forrester, Martha Bennett, VP & Principal Analyst, Forrester Today’s big brands have come to grips with a new advertising reality: Finding...

Canned Playbooks: Are They Realistic?

By Anton Chuvakin Research VP and Distinguished Analyst One of the new ideas we had for a 2019 research paper is something clients often (well, often–ish) ask about: what to do if you encounter a...

Joining the Dots to Solve the Security Puzzle

Symantec recently teamed up with CyberSecurity Malaysia to commission a survey with Malaysian IT professionals. Our aim was to get targeted insights into how well Malaysian IT professionals understand the cyber security threats...