<
>

The Race to Secure Your Data: Quantum Computing and Beyond

As the technological landscape shifts, so too does the difficulty of ensuring the security of our information. Quantum computing is a major concern since it might theoretically crack our existing encryption technologies in...

Navigating the Complexities of Network Security With Gigamon's Michael Dickman

Networks are the backbone of any effective cybersecurity strategy. Yet when more complex and advanced attacks emerge, keeping the network secure might seem like a gargantuan task. To shed light on this issue, CSA spoke to...

Companies Can Empower Their Cybersecurity by Empowering Their Employees

The human aspect of cybersecurity is vital. In fact, it can spell the difference between cybersecurity that works and one that doesn’t. People, unfortunately, continue to be the weakest links when it comes to...

The Rise of Nation-State Adversaries Marks a New Frontier for Cybercrime

While it is no secret that cybercrime (also known as "e-crime") is on the rise, what is surprising is the sharp uptick in attacks launched by nation-state adversaries. When compared to common cybercriminals,...

Why it is Time to Rely More on Machines in the Fight Against Ransomware

Every cyber threat is a concern. But ransomware is arguably the biggest threat today, especially for organisations in Southeast Asia. In fact, research by Kaspersky found that approximately two-thirds of businesses in the region...

Sophos CEO Advocates the Need for Round-the-Clock Data Breach Prevention for the Masses

Data loss and disruption due to security breaches are a constant danger for modern businesses. Increasingly complex attacks, the rise of telecommuting, and the vulnerability of the workforce to social engineering techniques are...

Trust Must Always Be Earned: Why Adopting the Zero-Trust Paradigm is the Norm in This New Normal

Zero-Trust is beyond a buzzword by this time. It is even more than just strategy. It is now a paradigm, a philosophy. Actually, zero-trust is the standard in cybersecurity now—and beyond. Daniel Kwong, Field Chief...

How Secure is Your Favourite Browser?

These days, almost every browser has a built-in password manager that can store login information for websites and services. In fact, the choice is typically shown as a pop-up window with the word "save" highlighted as...

The Seismic Shift: Charging Past Passwords With Passwordless Authentication

It used to be that passwords kept personal and sensitive information safe. Nowadays, a password may very well be a free pass for the modern cybercriminal—savvy and sophisticated and all sorts of sly. Last year’s...

Deep Observability: A New Layer to Add to Your Security Arsenal

Many organisations still have reservations about migrating all or a portion of their infrastructure and digital ecosystem to the cloud due to security concerns over the increased vulnerability exposure. The addition of deep...