Data Protection on Demand Helps Orgs with Cloud HSM, Encryption & Key Management, Finds Test

Data Protection on Demand Helps Orgs with Cloud HSM, Encryption & Key Management, Finds Test

Data protection is more challenging now than it ever has been. The emergence of virtualization and cloud services, for instance, has made it difficult for organizations to uniformly safeguard their information across ...
Midsized Businesses Need Enterprise-Sized Security

Midsized Businesses Need Enterprise-Sized Security

Though cybersecurity is not a one-size-fits-all proposition, it is also not accurate to say that smaller companies need smaller security. Osterman Research surveyed 900 security pros worldwide and found that 73 percent ...
Security Boulevard
Using Encryption Key Management to Navigate the Digital Cloud Transformation

Using Encryption Key Management to Navigate the Digital Cloud Transformation

Many organizations are undergoing a digital cloud transformation in which they’re moving their computing resources from on-premises data centers to the cloud. Most have a blend in what’s known as a hybrid ...
Facing the Fear and Securing the Internet of Things (IoT)

Facing the Fear and Securing the Internet of Things (IoT)

There are officially more IoT devices than humans in the world. And by 2020, there will be twice as many of them than us. And according to a recent study by Gemalto1, ...
6 in 10 Consumers Feel Social Media Poses the Greatest Risk to Their Personal Data Security, Finds Survey

6 in 10 Consumers Feel Social Media Poses the Greatest Risk to Their Personal Data Security, Finds Survey

Customer loyalty is more important than ever in the age of digital security. On the one hand, failure to disclose a data breach can adversely affect customers’ loyalty to an organization and ...
Blockchain Security: 3 Ways to Secure Your Blockchain

Blockchain Security: 3 Ways to Secure Your Blockchain

From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. Improved data security, faster transactions and cost savings ...
Much Ado About Financial Services and Compliance

Much Ado About Financial Services and Compliance

Why financial institutions should adapt a data-centric approach for compliance obligations Last September my colleague Alex Tay tackled the state of cybersecurity in Singapore and reasons for critical information infrastructure (CIIs) sectors ...
Enterprise Security Beyond the Firewall

5 Crucial Requirements for Enterprise Security Beyond the Firewall

In today’s world, sensitive information is scattered throughout the enterprise. Given this reality, firewall-only solutions are hopelessly outdated and IT organizations need to re-think their approach to enterprise security. Given the scope ...
Security Boulevard
Phishing the Most Common Attack on Australian Organizations in Q3 2018, Finds OAIC

Phishing the Most Common Attack on Australian Organizations in Q3 2018, Finds OAIC

A new report from the Office of the Australian Information Commissioner (OAIC) reveals that phishing was the most criminal attack suffered by Australian organizations in Q3 2018 ...
OAIC

Declared Data Breaches Remain Steady Quarter-on-Quarter

The steady number of data breaches declared in the last 2 quarters shows that this problem isn’t going away any time soon. The good news is that there are some things that ...
Loading...