<
>

Secure Your Email by Moving it to O365 with Microsoft & Barracuda

Whilst the adoption of O365 based email is widespread, many organisations remain hesitant due to the perceived security risk.  Even for those that have made a move, there is often a lot to be done to secure your...

How to Align your Business Objectives with Cyber Security Imperatives

Businesses may be trying to adapt to the changes brought on by the new normal but cybercriminals are not going to sit and wait until you find your footing. This is their chance to pounce on any vulnerabilities and weaknesses that...

Remediation is Everything When it Comes to Cybersecurity

Having a line of defence is the “belt and braces” of any cybersecurity posture. But listen to any reputable security expert and they will tell you it’s not a matter of IF you get breached, it’s a...

Hybrid Multi-Cloud Networking That Delivers a Better Application Experience With No Security Compromise

The cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of IT’s direct control. Instead...

Enduring From Home: Covid-19’s Impact on Business Security

With over 25 million cases worldwide, COVID-19 has pretty much reshaped our entire way of life. For businesses, many have had to immediately transition their entire workforces to work remotely. But it hasn’t been all smooth...

Protecting Your Critical Infrastructure with a Risk-Based Approach as IT and OT Converge

As more systems and devices become increasingly interconnected, organisations are finding that the previously disparate worlds of Operational Technology (OT) and IT are converging. While there are tremendous benefits to this, it...

Open Virtual Panel Philippines (Data Security and Privacy in the Digital Economy)

The Philippines’ Data Privacy Act is the overarching legal obligation on data privacy that affects every Philippine company. Some businesses have industry-specific frameworks they are obliged to follow, such as the PHIE in...

IBM Security Webinar: Enforced Remote Access Requires Zero Trust Access Management

Most companies built their identity and access management policies and solutions around known and expected perimeters of their networks and user locations. As the current world crisis throw those perimeters into a spin, the ways...

Open Virtual Panel Indonesia - Is Your Security Posture Able To Keep with The New Normal?

You have a SOC, and you have invested in SIEM technology. Naturally, you feel your company must be secure, right? Unfortunately, the answer is only “Maybe”. Indonesia faces some very specific problems. With...

Open Virtual Panel Malaysia: Data Security and Privacy in the Digital Economy

Even non-Malaysian privacy laws like the GDPR can still impact Malaysian companies. The threat is not just about outsiders breaking in. The challenge of stopping internal team members from either maliciously or unintentionally...