Thursday, November 21, 2024

Managing risk is key to solving complex IT problems

Cybersecurity and reliability risks cannot be managed by working in silos, although operations and security teams have historically strained relationships as they work on the same systems while having different priorities. Industry analysis and advisory firm, Intellyx’s Jason Bloomberg, explores why building a common engineering approach is the key to collaboration and solving complex IT […]
Read More

The operational significance of real-time visibility

Many organisations in Asia/Pacific (AP) now generate more than 42% of their revenue from digital products and services, highlighting the need for robust and resilient technology to ensure seamless interactions with customers and partners. As organisations, those in government and private sector, continue their digitalization journey, there is growing demand for real-time visibility, whether it […]
Read More

How JLL gained visibility into nearly 100K endpoints with Tanium

Like many companies during the global pandemic, JLL allowed employees to work from home and other remote locations. While this improved worker safety and flexibility, for the company’s cybersecurity staff, all those remote endpoints created a major challenge. Why? The issue is operational coverage. JLL has more than 98,000 employees operating in over 80 countries. […]
Read More

Cybernomics 101 - Uncovering the financial forces driving cyberattacks

A global survey of over 1,917 IT security practitioners revealed the behaviour and proven security measures implemented by ’High Performers’ that can serve as models for success. Key findings The report presents best practices that will help any organisation become more effective in identifying, containing, and recovering from attacks. It also analyses the security challenges […]
Read More

A CISO’s guide to the role of AI in cybersecurity

Today's digital landscape is evolving at an unprecedented pace, and the rapid emergence of generative artificial intelligence (GenAI) marks a distinct shift in how we perceive and use the capabilities of AI. This e-book is specifically tailored to senior IT security and risk professionals seeking to navigate the complex landscape of cybersecurity and shed light […]
Read More

Why endpoint management is more critical than ever before

Cyber threats like ransomware are increasing, and endpoints are more varied, numerous, and distributed than ever before. By following the strategies outlined in Views from the C-suite: Why endpoint management is more critical than ever before, security teams can reduce the risk of cyberattacks and ensure that when attacks occur, they can be contained quickly […]
Read More

The Essential Eight: Implementing the Australian cyber security centre's essential eight recommendations

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies, in the form of the Strategies to Mitigate Cyber Security Incidents, to help organisations protect themselves against various cyber threats. The most effective of these mitigation strategies is the Essential Eight. The Essential Eight has been designed to protect Microsoft Windows-based internet-connected networks. While […]
Read More

Information risk management – expectations versus reality

Information and security management have often been measured in terms of costs incurred, instead of business outcomes achieved. Although this is changing, digital transformation presents new challenges for enterprises that want to gain a clearer view of their IT assets, technology risks and vulnerabilities. Click on the link and learn how senior leaders are addressing […]
Read More

Top 3 strategic priorities for security and risk management in 2023

Today’s organisations are facing uncertainty brought about by persistent inflation; scarce, expensive talent; and global supply constraints caused by the Russian invasion of Ukraine, COVID-19 lockdowns and energy shortages. This triple squeeze is impacting business globally and directly impacting the cybersecurity threat landscape for 2023. To help you prioritize your time and energy we’ve created […]
Read More

Live Poll

What is the biggest barrier to achieving a target security posture?
×

Login to your account below

or

Not a member yet? Register here

Fill the forms bellow to register

Retrieve your password

Please enter your username or email address to reset your password.