Ransomware attacks in Asia are escalating, showing a 39% year-on-year increase. Notably, Indonesia has experienced the highest number of data leaks, with 58 incidents, followed by Thailand with 30.
Cybercriminals are maximising the potential damage to your organisation to boost their profits. A staggering 91% of...
CSA DLP Survey Says:
CISOs face challenges & choices—some obvious, some not
The upsurge in hybrid work and cloud adoption on a global scale is no surprise. Organizations increasingly trust the cloud with their data, but sensitive data is still at risk in the cloud and requires comprehensive data protection...
Apps have become the new endpoint for the modern enterprise, driving productivity, revenue, and customer engagement. Globally, approximately 4 billion iOS and Android mobile devices are in use, with an average of 80 apps on each device, and each app is updated an average of 12 times a year. That means there are...
For many organisations, the platform is a key to remote work, global collaboration and the cloud. Unfortunately, the platform’s ubiquity and central role in the workplace also make it a prime target for cyber attackers—and often, the primary vector for compromising their victims. It's no wonder experts such as...
How do you keep a nationwide school system with more than 900,000 students and staff secure? For the New Zealand Ministry of Education, the answer starts with protecting email communications. Modern email threats can easily extend beyond geographic boundaries.
In this case study, New Zealand Ministry of Education...
Navigating the cybersecurity maelstrom. CISOs have faced several challenges recently, including adapting to a global pandemic and the shift to widespread remote working amid significant employee turnover. Thanks to hybrid working as standard and the growing reliance on cloud technology, the attack surface has never...
Despite existing email data loss prevention (DLP) controls, the top reported GDPR data breach type is “data emailed to the wrong person.” While rules-based DLP plays a critical role in protecting known sensitive data such as PII, Social Security numbers and payment card data, still there are risks it fails to...
Zero-day attacks and unpatched vulnerabilities make a lot of headlines. But the results of our inaugural 2024 Data Loss Landscape report show that people are the root cause of most data loss incidents.
This Global Survey Report of 600 security practitioners, explores the current state of data loss protection (DLP)...
Traditional Data Loss Prevention (DLP) solutions just don't cut it in today's hybrid work environments. They are cumbersome, hard to maintain, and don't scale well. Enter Netskope.
Netskope's cloud-delivered DLP offers a streamlined, scalable solution that consistently protects sensitive data across both...
CSA DLP Survey Says: CISOs face challenges & choices—some obvious, some not
The upsurge in hybrid work and cloud adoption on a global scale is no surprise. Organizations increasingly trust the cloud with their data, but sensitive data is still at risk in the cloud and requires comprehensive data protection...
Huntress CTO Chris Bisnett outlines the firm's innovative approach to simplifying SIEM by reducing data storage costs and focusing on relevant logs. These services support small and midsized businesses looking to enhance their security posture without the high expenses of a traditional SIEM.
Abnormal Security has raised $250 million in a Series D round led by Wellington Management, aiming to expand its AI-driven human behavior security platform globally. The funds will support new product development, international market entry, and preparations for a future IPO.
Your data is up against a lot, and cyberattacks are just the tip of the
iceberg. 94% of it and security leaders reported their organization
experienced a significant cyber attack last year.
Keeping that precious data safe means staying on top of emerging technologies, regulations,
and even shifting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.