To mitigate cyberthreats, telecommunications companies in the GCC region need to enhance their incident detection and response capabilities, says Doha, Qatar-based Mustapha Huneyd, former global CISO of Ooredoo, a regional telecom firm.
Southeast Asia has become a hotbed for cybercrime activities, says Anthony Bargar, former deputy CISO of the U.S. Department of Defense, who says enterprises in the region need to take a collaborative defense approach to respond to this new threat environment.
In this whitepaper you will discover solutions that have the ability to analyze and define risks, make decisions based on big data, and dynamically apply a set of Zero Trust policy controls that minimizes risk while creating a productivity-enhancing zero touch work environment.
As ransomware gangs attempt to boost their illicit profits, the RagnarLocker ransomware gang has brought a new tactic to bear: installing a full virtual machine on victims' systems to hide their crypto-locking malware while it forcibly encrypts files, security firm Sophos warns.
The increasing use of internet-connected devices in manufacturing facilities is opening up new ways for hackers to target so-called "smart" factories with unconventional attack methods, according to an analysis by security firm Trend Micro and the Polytechnic University of Milan.
Australian shipping giant Toll Group has vowed to again not pay a ransom after suffering its second ransomware attack of the year. In the latest incident, however, the company warns that attackers also stole corporate data - and it may get leaked.
Threat detection and response is a critical piece in an ongoing journey to improve your security program, but feeling confident in your coverage can seem challenging with a remote workforce. When users are remote, they may be operating assets like laptops in potentially hostile networks outside of IT and security's...
In a video interview, a panel of experts describes why implementing a "zero trust" architecture for the remote workforce during the COVID-19 pandemic requires redefining access control and security strategies.
Microsegmentation is an essential element of a "zero trust" approach to security, says Ritesh Mishra, global head, IT infrastructure and security at Dr. Reddy's Laboratories, who explains why in this interview.
With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans in place to ensure uninterrupted service, says Srilanka-based Sujit Christy, global CISO at John Keells Holdings.
Get objective insights into the seven MDR categories and their associated strengths and weaknesses. This instructive eBook will help you make more informed cybersecurity choices that align with your business objectives, in-house security resources and risk tolerance levels.
Read The Definitive Guide to MDR to learn...
Outsourcing your endpoint protection can deliver positive returns by improving operational efficiency and minimizing risk, but it's not always easy to prove the business case. This guide delivers specific guidance on how to calculate savings in the context of your organization's risk while accounting for size and...
Increasingly complex and sophisticated cyber-attacks are evading
traditional defenses, forcing firms to seek solutions beyond traditional
threat blocking and prevention mechanisms. Threat actors have had
success with phishing, zero-day malware/exploits, and fileless attacks and
are now cashing in on ransomware and...
With the rise of automation, remote access, and the ever-expanding Internet of Things (IoT), IT and OT teams are collaborating at an unprecedented rate to strengthen organizational network security. Business operations that rely on machinery and physical processes are no longer disconnected from the world.