TechDay Asia - Asia's technology news network
Asia
Search

Cybersecurity strategy stories - Page 3

Story image
Fortinet training edges toward closing cybersecurity gap
Thu, 12th May 2022
#
firewalls
#
network infrastructure
#
it training
The Fortinet Training Institute has made significant progress in closing the cybersecurity skills gap, on track to train one million people by 2026.
Story image
How open banking benefits customers, banks – and cybercriminals
Tue, 18th Jan 2022
#
ddos
#
fintech
#
api
Australia's move towards open banking has been hindered by slow progress. However, with the right security measures, the future of open banking can be secure.
Story image
Divide between IT and OT teams hindering unified cybersecurity strategies
Fri, 12th Nov 2021
#
cybersecurity
#
ponemon institute
#
cybersecurity strategy
Organizations are hindered by a cultural divide between IT and OT teams, preventing a unified cybersecurity strategy, a report from Dragos has found.
Story image
Appgate launches latest version of zero trust network access solution
Mon, 1st Nov 2021
#
malware
#
zero trust security
#
cybersecurity
Appgate launches new version of zero trust network access solution, offering enhanced capabilities for enterprises.
Story image
Ping Identity acquires Singular Key, extends no-code functionality
Thu, 30th Sep 2021
#
malware
#
devops
#
it automation
Ping Identity has acquired no-code identity specialist Singular Key to streamline integration of identity services.
Story image
Traditional solutions fail to secure organisations against today's malware
Tue, 29th Jun 2021
#
malware
#
firewalls
#
network infrastructure
Traditional anti-malware solutions miss nearly 75% of threats, according to new research from WatchGuard Technologies.
Story image
How to address cyber-threats as a strategic risk
Thu, 29th Oct 2020
#
cybersecurity
#
cybersafety
#
cybersecurity strategy
Cybersecurity should be a priority discussion point for business leaders, as point solutions and incomplete approaches create vulnerabilities.
Story image
Companies not utilising threat hunters correctly – study
Tue, 17th Dec 2019
#
advanced persistent threat protection
#
cyber threats
#
study
ThreatQuotient study reveals confusion over the role of threat hunters, with many teams focusing on reactive processes.
Story image
75% of DevOps professionals say certificate issuance policies slow them down
Mon, 16th Dec 2019
#
devops
#
apm
#
software development
Less than half of DevOps professionals believe developers always request certificates that serve as machine identities through authorised channels.
Story image
Organisations still not getting cybersecurity fundamentals right - Wavelink
Fri, 6th Dec 2019
#
mfa
#
wavelink
#
patching
Many organisations fail at basic cybersecurity, relying solely on advanced tools. Wavelink highlights the vital need for timely patches and employee training.
Story image
AiSP launches ladies in cybersecurity mentorship programme
Tue, 3rd Dec 2019
#
association of information security professionals
#
cybersecurity strategy
#
mentorship programme
AiSP launches mentorship programme to groom female cybersecurity professionals in Singapore, addressing talent shortage.
Story image
Business security performance impacting bottom line - Thycotic
Mon, 2nd Dec 2019
#
pam
#
apm
#
software development
When cybersecurity teams do not meet their targets, it impacts the CEO with longer hours, job insecurity, shareholder pushback, and bonus reductions.
Story image
Nine ways to boost IT security during the summer holidays
Wed, 27th Nov 2019
#
christmas
#
attivo networks
#
cybersecurity strategy
With fewer users to manage, IT teams will likely have more capacity to carry out tasks that might have been overlooked during the busy business year.
Story image
How user-centred design is reshaping cybersecurity
Tue, 12th Nov 2019
#
devops
#
martech
#
multi-cloud
A user-centered design approach starts with users and asking them what they want to gain a deeper understanding of their needs.
Story image
Time to turn the tables on cyber-attackers
Mon, 4th Nov 2019
#
firewalls
#
network infrastructure
#
network security
Australian businesses are adopting deception technology to counter cyber-attacks, mimicking attackers' tricks to safeguard critical systems and customer data.
Story image
How to level up Australia’s cybersecurity productivity – CrowdStrike
Wed, 30th Oct 2019
#
it automation
#
ai security
#
ai
The Productivity Bulletin showed that productivity levels in Australia has been declining in key industries since 2013, falling behind global peers.
Story image
Forcepoint increases cloud security presence to cover 128 countries
Thu, 17th Oct 2019
#
endpoint protection
#
cloud security
#
casb
This PoP expansion brings Forcepoint services to virtually anywhere in the world while delivering optimal security and productivity enhancing capabilities.
Story image
Fortune 500 companies failing to demonstrate cybersecurity commitment - Bitglass
Thu, 3rd Oct 2019
#
casb
#
report
#
bitglass
A Bitglass report reveals that 77% of Fortune 500 companies lack transparency in cybersecurity roles, with just 62% having a Chief Information Security Officer.
Story image
Why businesses need a strategy to combat the enemy within – Ping Identity
Wed, 18th Sep 2019
#
risk & compliance
#
ping identity
#
insider threats
While strengthening your organisation’s external defences with the latest tools and technologies makes sound sense, it’s only half a battle plan.
Story image
Time to include multi-factor authentication in your cybersecurity strategy - WatchGuard
Tue, 17th Sep 2019
#
firewalls
#
network infrastructure
#
network security
Enterprises looking to reduce the risk of cyber-compromise or attack need to think about adding multi-factor authentication technology to their arsenal.