The role of the Chief Information Security Officer (CISO) has notably changed since the COVID-19 pandemic – arguably the biggest catalyst for such a change as people transitioned to remote working. The widening...
Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital...
The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password...
A cyberattack is an existential threat to all companies, which puts the pressure on cybersecurity teams. The pressure continues to increase as more staff work from home and the skills gap continues to exist. Simon...
CIOs and CISOs must shift their mindset from network-centric security to data-centric security in order to have visibility over their data, said Petko Stoyanov, Global Chief Technology Officer at Forcepoint....
The survey found that 60% of Australian respondents across 500+-employee organizations admit that they don’t fully understand how security fits into DevSecOps. Progress, a trusted provider of application...
Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital...
Steve Singer, Regional Vice President and ANZ Country Manager, Zscaler, tells us completing the complex IT integrations required by mergers and acquisitions (M&A) processes is fraught with difficulties but many of...
Blake Darché, Head of Threat Intelligence at Cloudflare, introduces Cloudforce One, a new threat operations and research team from Cloudflare. Meet Cloudflare’s new threat operations and research...
Joseph Carson, Chief Security Scientist, Delinea, outlines some typical examples of Shadow IT that organizations should watch out for to maintain their own security. To curb shadow IT effectively, you have to be aware...
Pakistan’s largest bank relies on Recorded Future Intelligence Cloud to detect and respond to threats before they can do harm. The financial services industry is changing quickly as institutions undergo Digital...
Recorded Future’s intelligence powers manufacturing giant Toshiba’s advanced security strategy. Kenji Kojima, Senior Manager of Cyber Security Technology Center, Toshiba, discusses how Recorded...
Gemdale, a leading property developer headquartered in China, reduces administration time related to data protection by 40% with Veeam. Headquartered in Shenzhen, China, Gemdale is a leading property developer with a...
Sandfield, a software solutions provider based in New Zealand, has deployed the LogRhythm-based SIEM platform, following a recommendation by managed services provider Advantage. Sandfield is now benefitting from a new...
Insurance company Tower has turned to Zscaler to ensure a seamless transition to its ‘work from anywhere’ model. Darren Beattie, Manager of Networks and Access at Tower, tells us: “As a result of...
Bayad, a leading payment platform in the Philippines, is utilizing Aqua’s portfolio of cloud-native security solutions to ensure security and compliance of its digital wallet platform, biller aggregator service...
Signup to the Intelligent CIO APAC newsletter and never miss out on the latest news