What will be the top data breach and security trends in India and the rest of Asia in 2017? Experts offer their predictions, as well as insights on mitigating emerging risks.
As enterprise IT teams look into moving their critical workloads from on-premises traditional data centers into virtualized, software-defined data centers (SDDC), or even public clouds, they often face a number of important questions:
How can we ensure the availability, reliability, and performance of our mission...
In this evolving world of the cloud, you require a solution that is agile, secure, and automated, and that spans the growing visibility surface. The growing attack surface has created a multi-faceted, constantly-in-motion, next-generation "visibility surface" that needs to monitored and managed. And, you need to...
For organizations considering using public cloud-based services, asking tough security questions of the vendor is an essential first step, says Eric Chiu, president of HyTrust.
Law enforcement officials in the U.S., Europe and Asia say they've dismantled a resilient network used by cybercriminals to infect tens of millions of computers with malicious software.
As more organizations take advantage of cloud computing, it's essential that they set precise security expectations with their vendor partners, Carson Sweet of CloudPassage says in this video interview.
VMware Workspace ONE brings together the power of VMware AirWatch® and VMware Identity Manager to accelerate and secure Office 365 deployments. In this
white paper we'll explore how you can address above challenges with Workspace ONE, and enable the secure use of Office 365 across corporate-owned devices,
personal...
Cloud-based services can be both a "blessing and curse" when it comes to dealing with security, says John Houston, CISO and associate counsel for the University of Pittsburgh Medical Center, who explains why in this video interview.
For more than a decade, Christy Wyatt was immersed in mobile security - most recently as CEO of Good Technology. Now she has re-emerged as CEO of Dtex Systems. What new challenges does this role pose to the veteran security and technology leader?
The shift to cloud computing is driven by many factors, but the economics of the cloud are at the top of the list. Having access to virtually limitless compute resources that are accessible on-demand
and at consumption-based pricing is turning computing into a utility, just like we consume electricity.
The...
In an interview, former U.S. government cybersecurity official Mark Weatherford discusses why the desire to obtain cybersecurity insurance could be a strong catalyst for Asian enterprises to take security more seriously.
Many healthcare organizations embark on cloud migrations to achieve scalability, cost-efficiency, and higher application performance. But migrating applications to the cloud can be a complex process that requires careful planning and deliberation. Challenges can include unanticipated interoperability issues,...
Dropbox says its security has come a long way since 2012, when attackers stole 69 million login credentials. Its systems are now designed to resist and counter a breach to minimize impact on users.
While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, very little thought or effort is dedicated to security inside the data center. Once perimeter firewalls are breached, malicious attacks are generally able to propagate laterally inside the data center with...
Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.