Asia's Source for Enterprise Network Knowledge

Monday, May 1st, 2017

Security Without Compromise

Still hunting for that one firewall to keep today’s cyber threats at bay?

If you are a small business and thinking that hackers may not be interested in your data, you might want to re-assess that conclusion. If you are a big enterprise – or even a government organization – and thinking that your high investment on security solutions will keep you safe from cyber threats, you might likewise want to re-evaluate your opinion. 

Achieving Total Network Visibility and Continuous Compliance

Skybox was contracted by a high-profile commercial bank in the US.

Security is a technical and a human problem

Organizations today are challenged by security risks at both the technical level and the human level. At the technical level, network security has become extremely complex because networks have become more complex. To be effective, business operations have come to depend on advanced network architecture and infrastructure. Maintaining and securing this kind of infrastructure, architecture, and capability is out of reach for most small to midsized businesses and challenges even the largest enterprises.

Protecting the enterprise against mobile threats

Trends in mobile security that are changing the threat landscape

The Total Economic Impact Of Seeker – Interactive Application Security Testing (IAST)

Synopsys commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Seeker. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Seeker on their organizations, to support their Agile development approach while reducing costs and decreasing the threat of a data breach.

Bots: Biggest player on the cybercrime block

While ransomware and DDoS attacks get most of the publicity, the losses from bot fraud dwarf them both. And not many people, including the victims, seem to be doing much about it

Critical infrastructure: Off the web, out of danger?

While most of those systems are not directly connected to the internet, critics say there are still plenty of ways for hostile actors to get control of them

Rise of as-a-service lowers bar for cybercriminals

Criminal market changes with as-a-service offerings via exploit kits

How enterprises can balance IoT with cloud security

Jonathan Nguyen-Duy, VP, Strategic Programs at Fortinet speaks about how enterprises can balance IoT with cloud security. He addresses current issues such as, whether the potential benefits of IoT is worth the security risk, and how businesses can protect themselves from such security risks.


Fabricate and NOT stitch your security for today's hostile threat landscape

Business organizations looking to remain relevant and thrive in the evolving digital economy will do well to reconsider their security strategies to ensure they are well equipped to face the security challenges today and into the future.