<
>

Posts in Taxonomies

[E-Book] The Long Road Ahead to Ransomware Preparedness

  The ransomware menace is growing and evolving, with financial institutions becoming a prime target. Even with the rising popularity of hybrid backup, the reality is that ransomware...

Growing Cyberattacks Drive up Global Demand for Endpoint Security

The changing landscape and significant surge in cyber threats have contributed to the high demand for endpoint security solutions globally, finds Frost & Sullivan's recent analysis. Endpoint...

A New Global OT and Cybersecurity Report Highlights Key Industrial Organisational Challenges

Fortinet recently released the 2022 State of Operational Technology and Cybersecurity Report. Based on a detailed survey conducted in March 2022 of more than 500 global operational technology (OT)...

(ISC)2 Releases Agenda for Security Congress 2022 Global Cybersecurity Event

(ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – published the full agenda for its 12th annual (ISC)² Security Congress, which...

Malicious Hackers Go to Work as We Gear Up for International Travel

Article by: Teong Eng Guan, Regional Director, Southeast Asia and Korea, Check Point Software Technologies Despite airport delays, rising costs and continued uncertainty over COVID-19,...

Cyware and CyberQ Group Partner to Provide Advanced MSSP Cyber Fusion and Threat Intelligence Services

Cyware, the industry's leading provider of platform-agnostic Cyber Fusion Centers with next-gen SOC (NG-SOC) capabilities, is announcing a partnership with Cyber Q Group, an award-winning...

Why Do Political Risk and Cybersecurity Collide During a Crisis?

(ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – today confirmed that acclaimed political scientist Ian Bremmer will deliver a...

Check Point Software Warns That Long Weekends May See an Increase in Cybercrime

As most of Southeast Asia looks forward to a longer weekend breaks like the upcoming Hari Raya Haji this July, Check Point® Software Technologies Ltd., a leading provider of cyber security...

Enterprise Applications Run Your Business, so How Can You Secure Them?

By: Mike McGuire, product marketing manager at Synopsys Software Integrity Group Every so often, I get together with a group of friends to have a barbecue, watch a game, or grab dinner. We often...

Leveraging a Managed Detection and Response (MDR) Provider to Anticipate Cybersecurity Threats

As the saying goes “prevention is always better than cure” but if you don’t know what’s wrong, how can you prevent it?   Cybersecurity has been a major topic of...

Pages