fbpx

Latest Security Opinions


Six ways to max out network security in the age of IoT

Within the next two years, the amount of smartphone users will reach over 2.87 billion, from 2.57 billion users today. The majority of these users have always-on internet connectivity, providing them the ability to control devices from the palm of their hand, but how does this functionality connect to devices at home or at work?

When your individual devices are secure, the main point of entry into your IoT is going to be through your main network. There are many different methods that you can use to secure your networks against potential threats, but here are a few of the most effective:


From agile to fragile: Is DevOps the weak link in your cloud security strategy?
If organisations are not careful, pressures imposed on DevOps teams can compromise application and data security in cloud environments, writes Haim Zelikovsky In the next three years, public, private and hybrid cloud adoption will drive roughly 25 percent of the growth in the software as a service ‘SaaS’ market. Without the cloud, SaaS can’t mature... Read More

3 ways to secure your business against future cyber threats
Ahead of his presentation at Cloud Expo Asia in Singapore, Steve Ng, Lead, digital platform operations at Mediacorp Singapore, explains how organisations can prime themselves for evolving cyber threats Cyber security is a challenging field with a broad spectrum of technologies, threats, processes and zero-day exploits, one where both good and bad actors are searching... Read More

Singapore Cybersecurity Consortium: On the frontline of today’s cyber battlefield
Ahead of her presentation at Cloud Expo Asia Singapore in October, Dr Vivy Suhendra, executive director at the Singapore Cybersecurity Consortium, dives deep into the consortium’s work to shore up Singapore's cyber resilience Cyber security is a constantly evolving field, and rapidly so. We need to not only keep pace with cyber threats in the... Read More

AI and cyber security: Separating hype from reality
Is artificial intelligence revolutionising cyber security or is it just another brick in the wall? Pascal Geenens, security evangelist for Radware, thinks there’s cause for caution when it comes to AI If we’re to believe the most enthusiastic backers of AI-led cyber security, trained security specialists could soon be replaced with sci-fi like defences that... Read More

For truly intelligent cyber security, pair AI with humans
It’s the human plus technology combination that can truly tackle today’s spectrum of cyber threats, writes Alex Jinivizian, VP of strategy, eSentire AI is all the rage, purported as the next big thing due to the dramatic increase in speed, automation and efficiency in projects that implement it. But the practical benefits of AI—significant acceleration... Read More

Proactivity needs to replace procrastination as the foundation of IT security

It’s easier than you think to operate a proactive security strategy, writes Jon Lucas For every business in today’s digital landscape, IT plays a vital role. Ensuring that systems and applications are working across all aspects of the company is not just an IT team’s problem, but something that the board should be involved in… Read More


A brief history of SIEM
The first generation of SIEM gave security professionals visibility. Then, SIEM 2.0 took it away by presenting more data than they could possibly cope with. Now, machine learning is revolutionising the game once more, and CISOs should take note To understand where we are today with security information and event management (SIEM), it’s important to... Read More

How to build resilient IT infrastructure
The art of IT resilience is the orchestration of multiple different processes and technical solutions to protect what is effectively the lifeblood of a company: the availability of its data and applications, writes Zerto's Steve Blow Described in the Oxford English dictionary as being “the capacity to recover quickly from difficulties” and “the ability of... Read More

There is a fundamental misunderstanding about what it takes to secure the mainframe
Mainframers need better tools, training and education, writes Ray Overby, co-founder and president of Key Resources In today’s world, mainframes play a critical role in the daily functioning of most of the largest corporations and in many cases are the backbones of data centres. They keep daily operations up and running in industries ranging from... Read More

Before you pay your ransomware read this
Speaking to Techerati, Naaman Hart, cloud services architect at cybersecurity company Digital Guardian, explores the pressures to pay ransoms and the rise of the trustworthy attacker Ransomware is such a popular means of attack that its almost becoming infeasible to report on every single breach. According to recent figures, ransomware accounts for nearly 24 percent... Read More

Are you prepared for the enterprise 2G/3G shutdown?
The looming 2G/3G shutdown represents an opportunity to deploy future-proof IoT solutions that prioritise network connectivity and security. By acting now, business leaders can enable a clear pathway to 5G in the coming years, says Donna Johnson, VP of product and solution marketing at Cradlepoint Mobile 2G/3G networks are going away. Some carriers’ shutoff dates... Read More


Do NOT follow this link or you will be banned from the site!