<
>

Posts in Cyber Safety

New Research Shows 75% of APAC Organisations Believe Zero Trust Frameworks Are Very Important Following COVID‑19

Ivanti Inc., the automation platform that makes every IT connection smarter and more secure, unveiled the findings of a Frost & Sullivan study it commissioned, entitled “Embracing...

Digital Hygiene and Mindful Communication: New Course by Kaspersky and Endtab.org Teaches How to Defend Against Doxing

With our lives essentially transferred to the digital world since last year, keeping our digital space safe and secure has become more important than ever. Recognition of the importance of online...

Cybercrime Thrives During Pandemic: Verizon 2021 Data Breach Investigations Report

The Verizon Business 2021 Data Breach Investigations Report (2021 DBIR) examines more breaches than ever before, and sheds light on how the most common forms of cyberattacks affected the...

74% of CISOs Would Pay a Premium to Work with Cybersecurity Vendors that are Thought Leaders

Code Red, global PR-communication security network, is releasing its  research report into the value of thought leadership as a crucial marketing tool. Convincing sceptics of its worth can be...

ExtraHop Security Advisory: 67% of Enterprise Environments Still Run Protocol Exploited by WannaCry & NotPetya

ExtraHop, the leader in cloud-native network detection and response, released a security advisory about the prevalence of insecure protocols in enterprise IT environments. The report details the...

Tips for Implementing Zero Trust - Taking Trust Away From Security

Authored by: Matthew Heap, Head of Solution Architecture, APJ for Rackspace Technology. Whether it’s between leaders, managers and workers, vendors and customers, or companies and...

Prioritising Network Monitoring Amidst Pandemic Transformation

Authored by: David Sajoto, Vice President, Asia Pacific and Japan, ExtraHop Remote working is here to stay - maybe not as widespread as it is today but at a much higher rate than before. As the...

Origin Shielding: Protect Your Origins at All Costs

Authored by: to Peter Löfling, General Manager APAC, Varnish Software.   While not classified as a traditional cybersecurity method, origin shielding is a practice that lets you protect...

Beware of What You Post Online or You May Regret It

Over the recent weeks, you’ve probably heard or seen reports of the data hack that happened on Facebook and LinkedIn, which exposed millions of users’ personal information online. Both...

Synopsys to Showcase New Application Security Orchestration Solution at RSA Conference

Synopsys, Inc. announced it will showcase the Software Integrity Group’s new Intelligent Orchestration solution at RSA Conference on May 17th - 20th. Intelligent Orchestration is a dedicated...

Pages

Subscribe to RSS - Cyber Safety