Data Breach

Symantec plugs IoT holes with integrated cyber-defence platform
The proliferation of devices increases attack vectors for bad actors so a holistic integrated approach is needed to combat the menace.
To inform or not to inform, that is the question
The leak of Astro customers' data has raised the issue of whether companies in Malaysia should be compelled by law to inform customers of personal data breaches.
Lawyers for Liberty crank up heat on MCMC
Lawyers for Liberty urge new Malaysian Communications and Multimedia Minister to investigate Malaysian Communications and Multimedia Commission for wrongdoings.
Gotta catch ‘em all: Data privacy and Pokémon Go
As a lawyer and technophile, Michael Bishop of Commvault writes that he is both excited by the possibilities of AR and concerned over its wider privacy implications.
Forcepoint sees strong demand for insider security solutions
According to US-based security solutions company Forcepoint, citing findings from Forester Research, more than half of data breaches are due to insider misuse or miscellaneous errors.  
It’s time for cyber-insurance – even if you’re a small business owner!
As cybercriminals continue employing increasingly sophisticated methods to compromise their targets, security is no longer about if but when a company will be hit by a data breach, according to Symantec.
Most APAC organisations breached, the rest don’t know they’ve been hit!
Asia essentially has a bull’s eye painted on it, and economic growth is going to make matters worse, writes Benjamin Cher.
When it comes to security, screw the ROI and just do it!
It’s only normal for business leaders to be concerned about the ROI on any money they spend, but that’s missing the point when it comes to cybersecurity, says an IDC analyst.
How to ensure you have a data-secured environment
Vishak Raman of Tata Communications on the major trends affecting organisations’ information security plans, and the best practices to securing your environment.
SMEs, here are eight steps towards secure e-commerce transactions
Faced with resource limitations, it is crucial for SMEs to concoct a well-thought out security approach right from the start, layered strategically to scale and adapt as the business evolves, writes Britta Glade of RSA Conferences.
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital copy of Digerati50 2018-2019