Enterprises and governments will not be able to mitigate against threats if they do not rethink how they implement cyber-security now.
Security report by E&Y says 99% of cyberattacks can be prevented if existing patches were installed.
You will be breached. And when you are, will someone know what to do, poses Dani Michaux of KPMG Malaysia.
A CISO needs to connect the boardroom to the server room, while still allowing innovation to flourish – with security embedded in it!
Restricting or cutting off access should not even be a consideration, while threat intelligence needs to grow up and become actionable, security experts tell Benjamin Cher.
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them, according to a study recently released by IBM Security and IBM’s Institute for Business Value (IBV).
CyberSecurity Malaysia (CSM) has teamed up with EC-Council to organise the Asean CCISO Workshop 2015, which CSM said would strengthen the information security landscape of Asean countries.
After having slept, drunk and eaten at the recent RSA Conference Asia Pacific and Japan (RSAC APJ) in Singapore, Benjamin Cher gathers his thoughts and comes away with some key takeaways.
Palo Alto Networks believes that its Traps Advanced Endpoint Protection addresses many of today’s trickiest security pain points, and heralds a paradigm shift from detection and remediation, to pure prevention.
CyberArk has announced the availability of Master Policy, which it said was a ‘policy engine’ that would enable customers to set, manage and monitor privileged account security in a single, simple, native language interface.