Whitepaper

Achieving an Assume Breach Culture Within Your Organization

Do a quick internet search for enterprise security strategy, and you’ll likely come across the term “zero-trust” with varying definitions from some of the biggest names in the tech game. Enterprise security means different things to different people, as the many definitions show us. But key to adopting an effective security strategy is determining a […]

Achieving an Assume Breach Culture Within Your Organization Read More »

Next-Generation B2B Integration Enables a Digital-First, Resilient Supply Chain

IDC Opinion / Executive Summary The past three years have been tough on supply chains. Disruptions of difering scale, duration, and complexity have exposed numerous “cracks” across the breadth of operational processes and revealed a disturbing lack of resiliency in many key areas of the supply chain. While digital tools and capabilities are not the

Next-Generation B2B Integration Enables a Digital-First, Resilient Supply Chain Read More »

Data Breach Notification Rules in the Asia Pacific Region

Over the past decade, the volume, frequency, and severity of cybersecurity incidents have escalated. Since the first documented mega-breach in 2013, there has been a steady increase of cybersecurity incidents resulting in significant losses of data and funds. While not every account breached has had financial information compromised, the global cost of cybercrime remains staggering:

Data Breach Notification Rules in the Asia Pacific Region Read More »

The State of Ransomware in Education 2022

Findings from an independent, vendor-agnostic survey of 5,600 IT professionals in mid-sized organizations across 31 countries, including 730 respondents from the education sector. Introduction Sophos’ annual study of the real-world ransomware experiences of IT professionals in the education sector has revealed an ever more challenging attack environment together with the growing financial and operational burden

The State of Ransomware in Education 2022 Read More »

How are Australian Companies Adapting to the New Threat Landscape?

Despite the common perception that Australian companies are mature in terms of their cybersecurity postures a recent Ecosystm study reveals the opposite. As companies move more resources to the cloud, increase IoT usage, and employees increasingly work remotely, a new approach to cybersecurity is required. A recent study based on 204 interviews with Australian cybersecurity

How are Australian Companies Adapting to the New Threat Landscape? Read More »