<
>

3 ways Hacker Powered Security helps the agile CISO

By: Rena Chua, Bug Bounty Advisor at HackerOne Security teams are challenged by the radical shifts in software development, from the fast pace and frequent releases to new languages and modern models. In that...

Cyber threats growing, but security responses aren’t keeping pace

By: Taylor Armerding, Security Expert at Synopsys Software Integrity Group The cyber threat landscape is going to get worse before it gets better — if it ever gets better. That’s the view of a...

Security isn’t ‘front of mind’ in the IoT

By: Taylor Armerding, Security Expert at Synopsys Software Integrity Group It is not breaking news that the Internet of Things (IoT) is growing — exponentially. It is fast becoming, as many have labeled it, the...

The Business Impact of our Changing Landscape

Authored by: Kevin Gallerin, Managing Director, Asia Pacific, YesWeHack BUG BOUNTY PROGRAMMES WILL GAIN TRACTION AS A WAY TO BOOST STAKEHOLDER CONFIDENCE There’s a great lack of trust for digital services...

The Evolving Risks in Asia Pacific for 2020

Authored by: Daniel Mountstephen, the Regional Vice President of Centrify in Asia Pacific & Japan 1. Misplaced Understanding Of Cloud Security Increases Risk A 2019 Centrify study revealed that 60% of organizations...

Carbon Black: 2020 Predictions on Singapore's Cybersecurity Landscape

Authored by: Tom Kellermann, Cybersecurity Strategist at VMware Carbon Black Evolving and advancing techniques, tactics and procedures (TTPs) “Cloud jacking and subsequent island hopping will become a more...

How Artificial Intelligence Enhances Cybersecurity

By: Yaelle Harel and Adeline Chan, Threat Prevention Marketing Managers at Check Point Software Technologies  Cyber attacks continue to evolve at an ever-increasing pace. Threats have become more sophisticated and...

When Human Resources (HR) Asks For Your Password

Authored by: Morey J. Haber CTO, CISO BeyondTrust As a security educated end user within my organisation, I have repeatedly instructed employees never to share their corporate passwords with anyone. In fact, as a security...

Endpoint Remediation Explained

Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT device. Today,...

Endpoint Isolation Explained

Endpoint isolation is a technique used by cybersecurity solutions to segregate at-risk computers or other endpoint devices from the rest of the network in order to effectively remove the threat, run remediation and investigation...