CISO

Cyber-security needs a new paradigm: Expert
Enterprises and governments will not be able to mitigate against threats if they do not rethink how they implement cyber-security now.
Good security begins with good hygiene
Security report by E&Y says 99% of cyberattacks can be prevented if existing patches were installed.
When will you be breached? And what will you do?
You will be breached. And when you are, will someone know what to do, poses Dani Michaux of KPMG Malaysia.
So what does the CISO really do?
A CISO needs to connect the boardroom to the server room, while still allowing innovation to flourish – with security embedded in it!
Cybersecurity: Here’s how NOT to defend yourself
Restricting or cutting off access should not even be a consideration, while threat intelligence needs to grow up and become actionable, security experts tell Benjamin Cher.
C-suite still largely clueless about cybersecurity: IBM study
Many leaders across the C-suite are confused about who the true cybersecurity adversary is and how to effectively combat them, according to a study recently released by IBM Security and IBM’s Institute for Business Value (IBV).
CSM and EC-Council collaborate on Asean CISO workshop
CyberSecurity Malaysia (CSM) has teamed up with EC-Council to organise the Asean CCISO Workshop 2015, which CSM said would strengthen the information security landscape of Asean countries.
The threat landscape runneth over, here’s what we need to do
After having slept, drunk and eaten at the recent RSA Conference Asia Pacific and Japan (RSAC APJ) in Singapore, Benjamin Cher gathers his thoughts and comes away with some key takeaways.
Palo Alto Networks seeks to offer definitive endpoint protection
Palo Alto Networks believes that its Traps Advanced Endpoint Protection addresses many of today’s trickiest security pain points, and heralds a paradigm shift from detection and remediation, to pure prevention.
CyberArk unveils Master Policy, new approach to privileged account security
CyberArk has announced the availability of Master Policy, which it said was a ‘policy engine’ that would enable customers to set, manage and monitor privileged account security in a single, simple, native language interface.
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital copy of Digerati50 2018-2019