<
>

Posts in Taxonomies

Check Point Launched Infinity SOC to Identify and Block Cyber-attacks with Unrivalled Speed and Accuracy

Check Point® Software Technologies Ltd, a leading provider of cybersecurity solutions worldwide, has announced the launch of Infinity SOC, which unifies threat prevention, detection,...

Harnessing True Power of AI to Combat Cyber Threats

Authored By John Maddison, Chief Marketing Officer and Executive Vice President, Products at Fortinet  In the cybersecurity space, there has always been an unfair advantage for...

Weak Passwords Continue to be an Achilles’ Heel

As countries around the world ease up on their lockdown measures, businesses are now having to cope with the new cybersecurity landscape that they are now faced with. Cybercriminals are currently...

Open Virtual Panel Philippines (Data Security and Privacy in the Digital Economy)

The Philippines’ Data Privacy Act is the overarching legal obligation on data privacy that affects every Philippine company. Some businesses have industry-specific frameworks they are obliged...

IBM Security Webinar: Enforced Remote Access Requires Zero Trust Access Management

Most companies built their identity and access management policies and solutions around known and expected perimeters of their networks and user locations. As the current world crisis throw those...

Open Virtual Panel Indonesia - Is Your Security Posture Able To Keep with The New Normal?

You have a SOC, and you have invested in SIEM technology. Naturally, you feel your company must be secure, right? Unfortunately, the answer is only “Maybe”. Indonesia faces some...

Open Virtual Panel Malaysia: Data Security and Privacy in the Digital Economy

Even non-Malaysian privacy laws like the GDPR can still impact Malaysian companies. The threat is not just about outsiders breaking in. The challenge of stopping internal team members from either...

Your Business is Sprinting Towards The Cloud - Is Your Security Posture Getting Left Behind?

If your security posture is “reactive”, then in today’s age of automation and data explosion, you will always be shutting your “security” stable door too late and be one...

Addressing RMiT Regulations With Minimal Disruptions

It has been six months since the Central Bank of Malaysia, Bank Negara’s Risk Management in Technology (RMiT) policy came into effect. The policy requires banks and other Financial Service...
Taxonomy: Cyber Safety

Top Trends that Should Inform Your COVID-19 Security Posture

Authored by: Linda Gray Martin, Sr. Director & General Manager, RSA Conference together with cybersecurity experts from RSA Conference 2020 APJ: Paula Januszkiewicz, CEO, Owner,...
Taxonomy: Cyber Safety

Pages