<
>

Posts in cybersecurity

Cybersecurity Needs To Be Both Reactive and Proactive

by Aron Raj, CSA Journalist Tangible and intangible costs are the two types of costs businesses face in a cybersecurity breach. The amount of time and energy organisations spend to communicate...

Kaspersky calls for MY companies to build cybersecurity culture in preparation for Industry 4.0

Practical advice for companies in raising the employees’ security awareness, Kaspersky is encouraging companies to take it a step further, in embarking Industry 4.0, by introducing a...

Three important predictions about cybersecurity we can extract from the world’s most ‘cybermature’ industries

Authored by: Mark Thomas, VP, Cybersecurity at Dimension Data Innovation and positive change often transpire during times of great adversity, and there’s no better example right now than...

Forescout Study Reveals More Focus on Cybersecurity Required During M&A Activity

As many as 50 per cent of organisations in Singapore have encountered a critical cybersecurity issue or incident during a mergers and acquisitions (M&A) deal that put the deal in jeopardy. This...

Are You a Password Recycler or Cycler? One is a Security Best Practice, the Other, a Disaster Waiting to Happen

By Morey Haber, CTO & CISO at BeyondTrust Are you a recycler? Over the years, we’ve learned some difficult lessons about recycling. Having “disposable” everything while...

Forcepoint Leading the Charge in Human-Centric Cybersecurity

Two of the most overused sayings in IT today have to be "data is the new oil" and "people are the weakest link in the cybersecurity chain". There is, of course, a lot of truth in...

SoftwareONE Launches Security for Microsoft 365

SoftwareONE, today that it has launched Security for Microsoft 365, a new managed service that enhances the security of Microsoft 365 environments as well as manages and protects users, devices,...

CrowdStrike: Modern Cybersecurity threats demand a modern solution

As cyber-attacks escalate, organisations need to be aware of vulnerabilities and protect accordingly. The escalation of cyber-attacks places greater emphasis on the identification of...

Subscribe to RSS - cybersecurity