<
>

When Human Resources (HR) Asks For Your Password

Authored by: Morey J. Haber CTO, CISO BeyondTrust As a security educated end user within my organisation, I have repeatedly instructed employees never to share their corporate passwords with anyone. In fact, as a security...

Endpoint Remediation Explained

Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT device. Today,...

Endpoint Isolation Explained

Endpoint isolation is a technique used by cybersecurity solutions to segregate at-risk computers or other endpoint devices from the rest of the network in order to effectively remove the threat, run remediation and investigation...

Layered endpoint protection explained

Layered endpoint protection is a cybersecurity platform that integrates multiple layers of protection with a combination of rule-based techniques as well as static and dynamic threat detection technologies to protect an...

The Privileged Attack Vectors Behind the BeyondTrust Privileged Access Threat Report

Authored by: Morey J. Haber, CTO, CISO, BeyondTrust   Earlier this year, BeyondTrust published its annual Privileged Access Threat Report. The report was conducted with over 1,000 participants to gauge the perceived...

How Tech & Talent Can Help CISOs Get Ahead of Daily Battles to Win the Information Security War

Author: Mike Campfield, Vice President of Security, ExtraHop Chief information security officers (CISOs) and the data security teams they manage, are vital to ensuring the protection of data for any organisation on the...

What it’s going to take to fix the security debt crisis

We’re on the brink of cyber security crisis. In recent years, news on data breaches, ransomware attacks or accidental exposures by employees have been hitting headlines almost daily. In Singapore, there were three major...

Firewall Best Practices to Block Ransomware

Authored: Aaron Bugal, Global Solutions Engineer, Sophos Today, getting pwned is the rule, rather than the exception. Organisations that have managed to avoid breach or cyberattack are few and far between, with no...

Three important predictions about cybersecurity we can extract from the world’s most ‘cybermature’ industries

Authored by: Mark Thomas, VP, Cybersecurity at Dimension Data Innovation and positive change often transpire during times of great adversity, and there’s no better example right now than the daunting threat we’re...

Is Disabling Your Macros Good Enough? Cybersecurity Experts Share Tips to Mitigate the Risk of Macro Based Attacks

Macros that are used in Microsoft Office documents, such as Word, Excel or PowerPoint, are convenient tools that allow users to use low-level programming to help automate repetitive tasks. However, the problem is that they are...