In an interview, former U.S. government cybersecurity official Mark Weatherford discusses why the desire to obtain cybersecurity insurance could be a strong catalyst for Asian enterprises to take security more seriously.
Many healthcare organizations embark on cloud migrations to achieve scalability, cost-efficiency, and higher application performance. But migrating applications to the cloud can be a complex process that requires careful planning and deliberation. Challenges can include unanticipated interoperability issues,...
Dropbox says its security has come a long way since 2012, when attackers stole 69 million login credentials. Its systems are now designed to resist and counter a breach to minimize impact on users.
While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, very little thought or effort is dedicated to security inside the data center. Once perimeter firewalls are breached, malicious attacks are generally able to propagate laterally inside the data center with...
Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.
With today's connected enterprise and broad use of mobile devices, organizations are looking to keep their staff productive from wherever they are, while keeping data secure - hence the rise of intelligent key management. Increasingly, organizations are adopting Enterprise File Sync and Share (EFSS) and are using...
For its next move since jettisoning storage firm Veritas and becoming a pure-play security vendor, Symantec plans to buy network and cloud security firm Blue Coat from private-equity owners Bain Capital for $4.65 billion, gaining a new CEO in the process.
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Enhancing student engagement and improving their academic outcomes through digital learning is driving an unprecedented technology transformation. But turning digital learning into reality calls for district networks that are up to the task.
Juniper Networks offers a suite of solutions to help districts prepare...
Securing your data centers, edge, and cloud environments is an ongoing challenge as threat landscapes continue to evolve. Traditional firewalls are no longer sufficient. What's needed is a firewall that can adapt to emerging threats in near real time, in an automated and dynamic way.
This white paper discusses the...
In the face of rapidly emerging new technologies and eco-systems, such as the Internet of Things and Smart Nation, Singapore has issued new cloud outage incident response guidelines. Security leaders react to the core recommendations.
Cloud computing is revolutionary evolution- it is continuous, rapid, radical, and pervasive. More than 90 percent of enterprises are leveraging public cloud computing to provide some level of business services. We have embarked on a journey into the cloud that is irreversible, largely unknown, and unknowable. Fueled...
Even as cloud computing is increasingly adopted by healthcare organizations to host new workloads and applications, misconceptions still persist about the resilience and assuredness of cloud security. As clinical and IT stakeholders consider moving functions to the cloud, they may continue to have nagging doubts about...
Achieving HIPAA compliance is a journey, not a destination. The regulatory landscape is constantly changing, resources are stretched beyond capacity, disparate systems make it difficult to assess and remediate gaps, and the sophistication of cybercriminals is accelerating faster than most healthcare organizations can...
The proliferation of data everywhere has spawned a collusion of topics around Big Data, Internet of Things (IoT), and the Cloud. And they all have one major thing in common - they need data protection. Considering that more 707 million data records were compromised worldwide during 2015, it is key that data protection...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.