Securing your data centers, edge, and cloud environments is an ongoing challenge as threat landscapes continue to evolve. Traditional firewalls are no longer sufficient. What's needed is a firewall that can adapt to emerging threats in near real time, in an automated and dynamic way.
This white paper discusses the...
In the face of rapidly emerging new technologies and eco-systems, such as the Internet of Things and Smart Nation, Singapore has issued new cloud outage incident response guidelines. Security leaders react to the core recommendations.
The vast majority of cloud services today store - and manage - all related cryptographic keys for customers. But in the post-Snowden era, organizations that use cloud services must better control and lock down those environments, says WinMagic's Mark Hickman in this video interview.
What are some of the challenges practitioners will face as they attempt to look at emerging technologies, including CASB? How effective is the MSSP paradigm in addressing the skills gap? Expert security practitioner Manish Dave shares insights.
Security organizations increasingly are hampered by the complexity of managing so many disparate controls. What they need, Fortinet's John Maddison says in this video interview, is an integrated platform that can enable a more strategic approach to cybersecurity.
As public cloud offerings and technologies to secure them continue to mature, public cloud will increasingly feature in India's cloud story. How ready are security practitioners, and how much traction do technologies such as CASB have?
Financial institutions around the world are targeted by cybercriminals more than any other industry. To minimize risks, it is required to evaluate the current state of your security, aggressively identify the most significant risks, and modernize your security infrastructure.
Many organizations have been adding...
IT security and access management have never been greater challenges.
While the criminals get smarter, the IT environments become more complex to manage. Most are a hybrid of on-premise systems and a multitude of cloud providers transforming the act of role-based access management into a manual nightmare. To...
Aloysius Cheang of the Cloud Security Alliance says Asia is neither matured nor competent to understand the nuances of cloud security. CISOs must learn to harmonize data privacy regulations to a set of data protection principles that meet requirements.
The rising profile and increasingly complex nature of cyberattacks was a major development in 2015. What are the key threats for security practitioners to be wary of in the year ahead? FireEye CTO APAC Bryce Boland shares insights.
Most businesses use the cloud for at least some applications - collaboration, email, backups and disaster recovery. And many more plan to in the next 12 months. According to "Orchestrating Security in the Cloud," a SANS survey, 40 percent of businesses store or process sensitive data in the cloud. But is it safe from...
Cloud Access Security Brokers are the flavor of the season in cloud security. The value proposition is immense - enabling the enterprise to extend and enforce policies beyond the perimeter effectively. Let's take a closer look.
Security researchers have demonstrated in a lab setting an information-stealing attack against Amazon Web Services users. But Amazon says its customers "using current software and following security best practices are not impacted by this situation."
The Windows 10 Home edition being released by Microsoft includes on-by-default cloud services that may pose "bring your own device" risks to organizations, F-Secure security expert Sean Sullivan warns.