<
>

Why Identity Governance Matters: Rising to the Challenges of Secure Remote Access and Employee Productivity

With the expansion of businesses beyond their on-prem operations, resources are now shared or spread across heterogeneous IT environments. Ensuring valid and secure access has always been a challenge but now with the advent of...

Tech Lockdown Webcast with Halodata - Choosing the Right Solution to Protect Your Organisation from Cyber Threats

In the wake of Covid-19, the global workplace paradigm shifted to a remote workforce, and cyber attackers took advantage of it and preying on people’s fears. Since then, many companies have seen increased cyber threat...

Dealing with the Cyber Deluge How to Address the Increasing Amount of Cyber Attacks with Cloud-Scale Analytics

The accelerated digital transformation of many organisations has unlocked new opportunities. However, new challenges have also arisen. As their infrastructure and workloads grow in size and complexity, security monitoring...

Navigating the New Cyber Paradigm: How to Address the Dangers of Social Engineering

Fraudsters and scam artists have been around long before the social media era. However, now they are honing and improving their techniques, backed by advanced technologies making them more dangerous than ever. With phishing,...

Mastering Cyber Breach Remediation with Malwarebytes Webinar

It’s not IF you get breached it’s WHEN. No approach to cybersecurity defence is complete unless you have a strategy and tools to remediate in the event you are breached. The speed at which you identify a...

A Deep Dive into The State of Malware in South East Asia Webinar

One of the most important ways to steady your cyberdefences is to understand the where, whys and hows of cyber criminals and the methods they use. It’s no easy task and the goal posts keep moving as old attack methods...

Eliminate Ransomware and Data Loss with the New Veeam Backup and Replication v11 Webinar

Your data is critical to keep your business running. With workloads accelerating to multi-cloud ecosystems, you need a single, robust solution that is powerful and flexible enough to protect all phases of your evolving data life...

Building A Modern SOC - Empowering SecOps Teams To Keep Pace With Cyber Threats

The Security Operations Centre (SOC) was established to help companies detect, monitor, and respond to cyber threats. However, as attack volumes have surged and threats have grown more sophisticated in recent years, traditional...

Cyber Threat Landscape and Defender Strategies – With a Focus on Compliance for Malaysian Organisations

The FBI and other government agencies have issued alerts about state-sponsored actors exploiting known and persistent vulnerabilities across the globe, including in Malaysia and South East Asia. Watch this exclusive security...

Secure Your Email by Moving it to O365 with Microsoft & Barracuda

Whilst the adoption of O365 based email is widespread, many organisations remain hesitant due to the perceived security risk.  Even for those that have made a move, there is often a lot to be done to secure your...