Cybersecurity megatrends witnessed in the past few years –zero trust, XDR, the pandemic-induced increase in remote workers, and the move to public cloud– have led organizations to rethink their existing endpoint security strategy.
An in-depth survey by ESG was conducted with 359 IT and cybersecurity...
Digital transformation, the accelerated speed of attacks and the growth of data are some of the biggest factors that have pushed organizations to realize the importance of security automation, regardless of industry.
Automation, coupled with the advantages of AI and Machine Learning, helps security teams to detect...
To get zero trust strategy right, it is important to know what exactly to protect and decide what your crown jewels are. Three panelists discuss the various ways to do that and also offer their thoughts on whether zero trust is need for everything.
Palo Alto Networks' Senior Vice President and General Manager Anand Oswal discusses why a majority of customers in 2023 will adopt a zero trust strategy along with continuous authentication and identity management to ensure a consistent security architecture.
An important aspect of zero trust is continuous adaptive authentication, in which a user is authenticated continuously throughout the session, but implementing this technology poses many practical challenges. Three experts discuss ways to overcome technical issues and user resistance to change.
In the latest weekly update, ISMG editors discuss ways organizations commonly founder when implementing a zero trust strategy, what the latest version of India's digital data protection bill means for CISOs, and how a 2022 data breach confirmed by Twitter may be worse than initially thought.
Zscaler has notched large, multiyear, multipillar deals as the economic downturn prompts clients to seek replacements for expensive legacy point products, says CEO Jay Chaudhry. Clients are increasingly buying Zscaler's secure web gateway, private access and digital experience tools as one bundle.
The foundation of a landmark presidential executive order and now a standard embraced by governments and enterprises globally, zero trust has come far in the past two years. Zero trust creator John Kindervag offers a progress report and insight into the key trends he sees shaping the new year.
The U.S. Army has embarked on its zero trust journey for both its information and network operations. Army CIO Dr. Raj Iyer shares how the military and the private sector are partnering to secure cloud infrastructure and solidify threat intelligence capabilities to fight adversaries.
IT and security organizations can simplify the zero trust journey in the cloud by allowing internet traffic to go directly to the required destination instead of routing through the data center, says Sudip Banerjee, field CTO for Zscaler for the Asia-Pacific and Japan region.
How can companies take a data-centric approach to their zero trust strategy? Two experts - Scott Leach, vice president Asia Pacific at Varonis, and Maheswaran Shanmugasundaram, country manager for South Asia at Varonis - share why getting a handle on your data helps improve cybersecurity.
CISOs today are dealing with many kinds of attacks, and the volume of activity is overwhelming employees in the security operations center, potentially leaving the enterprise open to breaches, says Manish Sinha, director of sales engineering at Trellix.
In India, ransomware attacks, phishing, botnets and nation-state attacks - including attacks on supply chains and critical infrastructure - are all on the rise. Plus, there's a huge cybersecurity skills gap. Terence Gomes of Microsoft in India discusses how the company addresses these issues.
Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.
With massive digitization and cloud adoption, the attack surface has broadened and new threats have emerged. Challenges like ransomware, supply chain attacks and financial fraud continue to pose problems for security practitioners.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.