Enterprise Security

So what does the CISO really do?
A CISO needs to connect the boardroom to the server room, while still allowing innovation to flourish – with security embedded in it!
IT security spending: A budget drain or a necessary drag?
IT budgets are a finite resource while cybersecurity spending seems to be constantly ballooning. What’s a poor CIO to do?
It’s time for cyber-insurance – even if you’re a small business owner!
As cybercriminals continue employing increasingly sophisticated methods to compromise their targets, security is no longer about if but when a company will be hit by a data breach, according to Symantec.
Fewer than 10% of APAC companies understand how cyber-attacks are performed
Fewer than 1 in 10 companies in Asia Pacific fully understand how cyber-attacks are performed, according to a cybersecurity benchmarking online survey conducted by Trend Micro Inc.
Cybersecurity: Here’s how NOT to defend yourself
Restricting or cutting off access should not even be a consideration, while threat intelligence needs to grow up and become actionable, security experts tell Benjamin Cher.
When it comes to security, screw the ROI and just do it!
It’s only normal for business leaders to be concerned about the ROI on any money they spend, but that’s missing the point when it comes to cybersecurity, says an IDC analyst.
Quann in enterprise cybersecurity pact with Keppel Data Centres
The agreement will allow Keppel Data Centres’ customers to benefit from Quann’s holistic cybersecurity solutions that cover consultancy, network protection and monitoring, and incident response.
How to ensure you have a data-secured environment
Vishak Raman of Tata Communications on the major trends affecting organisations’ information security plans, and the best practices to securing your environment.
Data in motion: What are your employees doing to your data?
IT departments are fighting a losing battle against rogue or shadow IT, and employees are unknowingly exposing organisations to reputational risk.
Incident response still relying on ‘old tech’
Security responses need to move on from the traditional email, spreadsheets and phone calls to reduce response times, says one expert.
Subscribe to SNAP
Download Digerati50 2018-2019 PDF

Digerati50 2018-2019

Get and download a digital copy of Digerati50 2018-2019