Best Practice stories
ThycoticCentrify's latest update to Server Suite includes just-in-time privilege elevation workflows, reducing risk and improving security.
BeyondTrust's Universal Privilege Management model recognises that securing passwords is not enough — privileges must be secured across environments.
When a cyber attack on the United States Colonial Pipeline erupted in May this year, the fallout was almost unthinkable.
In this interview, Hyland director for APAC Eugene Chng discusses the company's recent acquisitions of Alfresco and Nuxeo.
Secureworks integrates threat intelligence from its Counter Threat Unit (CTU) into its Taegis VDR to detect and eliminate high-risk vulnerabilities.
The data analyst company says these companies must also build trusted data initiatives by increasing the capabilities required for digital trustworthiness.
Gamifying cybersecurity is key to preventing attacks, with Balbix reporting that most incidents are due to individual user behaviour.
AVEVA and RIB Software partner to drive construction assurance, efficiency, and sustainability. Integration to enhance AVEVA's Project Execution portfolio.
ThycoticCentrify bolsters privilege management and account governance capabilities to protect workstations and streamline security reporting.
Rushing to implement solutions can lead to poor CX and have significant negative impacts on the bottom line, writes NICE managing director for ANZ Rod Lester.
While many organisations use a TIP to make data actionable for detection and protection, far fewer use a TIP for forensics.
Tech Data and IBM have launched the Digital Transformation Series in the APAC region, aimed at fast-tracking digital transformation for partners.
Talend expands in APAC with new cloud data infrastructure in Australia to better serve customer growth in the region.
Traditional anti-malware solutions miss nearly 75% of threats, according to new research from WatchGuard Technologies.
Video game industry targeted by cyberattacks in pandemic, suffering over 240 million web application attacks in 2020 - Akamai report.
Apple enterprise management specialist Jamf has expanded its security capabilities, including compliance, passwordless authentication, and threat detection.
Managed cyber services are crucial for securing businesses' infrastructure, data, and processes, says SecurityHQ.
In his almost 20 years in the cybersecurity industry, Infosys CISO Vishal Salvi has watched threats change — and how they've ramped up in the last 18 months.
Research reveals that 60% of organizations are willing to pay ransoms in the event of a cyberattack, despite warnings against doing so.
CSO Group secures $7m deal with NSW DCJ for fully managed security monitoring service, delivered via a sovereign architecture powered by Macquarie Government.