<
>

Posts in Taxonomies

Solutions on IBM Cloud Series Featuring TmaxSoft: Unlock The Power Of Your Databases In The Digital Economy

Your organisation’s databases have always been the foundation on which your business is built. As we digitise and transform, databases are still at the heart of the most cutting-edge modern...

Four Measures to Prevent Being Held to Ransom by Malicious Actors, or Cyber Insurers

Authored by: Ravi Rajendran, Vice President, Asia Pacific and Japan at Cohesity Insurance by definition is ‘a financial agreement with a company where you pay regular amounts of money and...

BitCyber Forms Strategic Partnership with Virsec

BitCyber Pte Ltd, premium cyber security Value Added Distributor, announced a strategic partnership with Virsec, the first cybersecurity company to fully protect software as it is executing, to...

Horangi and Huawei Cloud Partner-up to Bring Comprehensive Cloud Security for Asian Organisations

Horangi, a Singapore-headquartered cybersecurity company which provides solutions optimised for cloud-based organisations, and leading cloud service provider, Huawei Cloud, today announced a...

Forcepoint Completes Acquisition of Bitglass

Forcepoint, a global leader in data-first security, announced the company completed its acquisition of Security Service Edge (SSE) leader Bitglass on October 22, 2021. SSE addresses today’s...

Getting ‘En Garde!’ Against The Ransomware Siege

Authored By: Charles Chow, Director of Sales Engineering, Commvault   Much like how the world is grappling with a health crisis right now, the digital ecosystem is also facing off one of its...

Zero Trust, the Remedy for Cyberattacks and Flexible Workforces

Cloudflare, Inc., the security, performance, and reliability company helping to build a better Internet, today released new findings on security practices across Asia Pacific, revealing how...

Anomali Detect LIVE: Event for Global Intelligence, Detection, and Response

Anomali, a leader in intelligence-driven extended detection and response (XDR) cybersecurity solutions, announced that Detect LIVE registration is open. As the industry’s premier global...

Cybersecurity Trends Forecast for 2022 and Beyond by BeyondTrust

BeyondTrust, the worldwide leader in Privileged Access Management (PAM), released its annual forecast of cybersecurity trends emerging for the New Year and beyond. These projections,...

BSIMM: Top Five Software Security Activities that Create a Better Software Security Initiative

Authored by: Taylor Armerding, Security Advocate, Synopsys Software Integrity Group For any organisation looking to improve the security of its software, Building Security In Maturity Model (BSIMM)...

Pages