Zero trust

CyberSecMY 2023

In the past year, the global business sector has experienced an extraordinary level of cyberattacks, which has created challenges for security teams to respond promptly. A significant number of vulnerabilities were identified, and malicious actors are still exploiting many of them in the current year. With Malaysia’s growing dependence on technology and digital infrastructure, ensuring […]

CyberSecMY 2023 Read More »

2022 Thales Data Threat Report: Critical Infrastructure Edition

Critical infrastructure, which for the purposes of this report includes energy/utilities, telecommunications, transportation and trucking/ shipping companies, became top of mind for many beginning in 2020 when high-profile security attacks impacted millions of people across the globe. From the ransomware attack that compromised a major U.S. gas pipeline in 2021 to the rise of nation-state

2022 Thales Data Threat Report: Critical Infrastructure Edition Read More »

Cyber Security Considerations 2022: Trust Through Security

Cyber security is about what you can do — not what you can’t The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is

Cyber Security Considerations 2022: Trust Through Security Read More »

CISO Zero Trust Online ASEAN

A range of unique and best-practice strategies await you at CISO Zero Trust ASEAN Online, including what the Zero Trust Principles are, applying Zero Trust, SASE and SSE, what a successful Zero Trust implementation process looks like, establishing your risk appetite, the top questions the board will ask, strengthening perimeterless security, manging the human risj

CISO Zero Trust Online ASEAN Read More »

CISO Zero Trust Online A/NZ

he pandemic has forced organisations to adapt to a new era of distributed work—and cyber threats have adapted right along with them. What are the best-practice Zero Trust models for securing your business? What are the steps you must take to implement Zero Trust across your ecosystem? What are the top trends in Identity Management

CISO Zero Trust Online A/NZ Read More »