Intelligent Enterprise Security

Ransomware attacks double in municipalities, healthcare, education

Ransomware attacks double in municipalities, healthcare, education

Barracuda Networks, provider of cloud-first security solutions, published its Fifth Annual Threat Spotlight on Ransomware. The new report looks at ransomware attack patterns that occurred between August 2022 and July...

Experts discuss the changing role of the CISO and its impacts on management style

Experts discuss the changing role of the CISO and its impacts on management...

The role of the Chief Information Security Officer (CISO) has notably changed since the COVID-19 pandemic – arguably the biggest catalyst for such a change as people transitioned to remote working. The widening...

Addressing cybersecurity debt before it’s too late

Addressing cybersecurity debt before it’s too late

Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital...

Expert advice for layering up your defences this World Password Day

Expert advice for layering up your defences this World Password Day

The annual World Password Day raises awareness of the importance of having robust and resilient password hygiene practices in place. We hear from various industry experts who discuss best practices for password...

Take the pressure down! Four ways to lower the stress levels of your cybersecurity team

Take the pressure down! Four ways to lower the stress levels of your...

A cyberattack is an existential threat to all companies, which puts the pressure on cybersecurity teams. The pressure continues to increase as more staff work from home and the skills gap continues to exist. Simon...

Ransomware attacks double in municipalities, healthcare, education

Ransomware attacks double in municipalities, healthcare, education

Barracuda Networks, provider of cloud-first security solutions, published its Fifth Annual Threat Spotlight on Ransomware. The new report looks at ransomware attack patterns that occurred between August 2022 and July...

Cloud cybersecurity best practices for CISOs and CIOs

Cloud cybersecurity best practices for CISOs and CIOs

With the cloud now widely adopted, many still appear to be unaware of the vulnerabilities they’re encountering and the steps to take to prevent them. Amit...

The three Cs of cybersecurity

The three Cs of cybersecurity

Strong cybersecurity is the backbone of every organisation. Check Point Software agrees, outlining the three C’s methodology below and why should they be central to an organisation’s strategy moving...

Simplifying security on the path to a multi-cloud future

Simplifying security on the path to a multi-cloud future

CIOs and CISOs must shift their mindset from network-centric security to data-centric security in order to have visibility over their data, said Petko Stoyanov, Global Chief Technology Officer at Forcepoint....

Progress survey reveals roadblocks to DevSecOps success in Australia

Progress survey reveals roadblocks to DevSecOps success in Australia

The survey found that 60% of Australian respondents across 500+-employee organizations admit that they don’t fully understand how security fits into DevSecOps. Progress, a trusted provider of application...

Addressing cybersecurity debt before it’s too late

Addressing cybersecurity debt before it’s too late

Singapore-based Vincent Goh, Senior Vice President, APJ, CyberArk, highlights the importance of raising awareness of ‘cybersecurity debt’. He tells us about solutions to solve the digital...

Allied Bank adopts a proactive security strategy with Recorded Future Intelligence

Allied Bank adopts a proactive security strategy with Recorded Future...

Pakistan’s largest bank relies on Recorded Future Intelligence Cloud to detect and respond to threats before they can do harm. The financial services industry is changing quickly as institutions undergo Digital...

Intelligence: The cornerstone of Toshiba’s aggressive security transformation

Intelligence: The cornerstone of Toshiba’s aggressive security transformation

Recorded Future’s intelligence powers manufacturing giant Toshiba’s advanced security strategy. Kenji Kojima, Senior Manager of Cyber Security Technology Center, Toshiba, discusses how Recorded...

Gemdale keeps online property sales flowing with 90% faster data recovery from Veeam

Gemdale keeps online property sales flowing with 90% faster data recovery...

Gemdale, a leading property developer headquartered in China, reduces administration time related to data protection by 40% with Veeam. Headquartered in Shenzhen, China, Gemdale is a leading property developer with a...

Sandfield strengthens IT security and automates monitoring with LogRhythm

Sandfield strengthens IT security and automates monitoring with LogRhythm

Sandfield, a software solutions provider based in New Zealand, has deployed the LogRhythm-based SIEM platform, following a recommendation by managed services provider Advantage. Sandfield is now benefitting from a new...

Tower enables employees to securely work from anywhere in New Zealand and Pacific Islands with Zscaler

Tower enables employees to securely work from anywhere in New Zealand and...

Insurance company Tower has turned to Zscaler to ensure a seamless transition to its ‘work from anywhere’ model. Darren Beattie, Manager of Networks and Access at Tower, tells us: “As a result of...

Bayad secures its Digital Transformation with Aqua Security

Bayad secures its Digital Transformation with Aqua Security

Bayad, a leading payment platform in the Philippines, is utilizing Aqua’s portfolio of cloud-native security solutions to ensure security and compliance of its digital wallet platform, biller aggregator service...

Browse our latest issue

Intelligent CIO APAC

View Magazine Archive