Closing the gap in Zero Trust implementation: What you need to consider
Organizations investing in Zero Trust may struggle to unify controls, risking exposure to AI-driven attacks, supply chain breaches, and compliance pressures.
Read MoreSelect Page
By Kenneth Lai, Area Vice President (ASEAN), Cloudflare | Wednesday, June 18, 2025, 1:18 PM Asia/Singapore | Newsletter, Tips
Organizations investing in Zero Trust may struggle to unify controls, risking exposure to AI-driven attacks, supply chain breaches, and compliance pressures.
Read MoreBy PR Newswire | Wednesday, June 18, 2025, 8:10 AM Asia/Singapore | PR Newswire
BENGALURU, India, June 17, 2025 /PRNewswire/ — 42Gears has launched SureIdP, a Zero Trust Identity and Access Management Solution that combines identity verification with device compliance. It enhances enterprise security...
Read MoreBy PR Newswire | Wednesday, June 18, 2025, 8:10 AM Asia/Singapore | PR Newswire
BENGALURU, India, June 17, 2025 /PRNewswire/ — 42Gears has launched SureIdP, a Zero Trust Identity and Access Management Solution that combines identity verification with device compliance. It enhances enterprise security...
Read MoreBy CybersecAsia editors | Friday, January 17, 2025, 11:09 AM Asia/Singapore | Case Study, News
Besides gaining improved incidence response, the firm and its subsidiaries has reported increased productivity and user experience
Read MoreBy PR Newswire | Tuesday, December 3, 2024, 10:30 PM Asia/Singapore | PR Newswire
BENGALURU, India, Dec. 3, 2024 /PRNewswire/ — 42Gears, a global leader in Enterprise Mobility Management, announced the launch of SureAccess, a cutting-edge Zero Trust Network Access (ZTNA) solution today. This innovative...
Read MoreBy L L Seow | Friday, November 8, 2024, 9:07 AM Asia/Singapore | Features, Newsletter
One third of zero is still zero — as organizations with partial or insufficient implementations of zero trust may learn
Read MoreBy Fortinet | Thursday, October 3, 2024, 2:14 PM Asia/Singapore | Sponsored, Whitepapers
As the lines blur between operational technology (OT) and information technology (IT), organizations must evolve their cybersecurity strategies to address the vulnerabilities introduced by increased connectivity. Don’t wait—download Fortinet’s white paper now to learn how to navigate the complexities of zero trust in your OT environments and strengthen your cybersecurity posture!
Read MoreCybercriminals need to be lucky just once, while cyber-defenders need to be right all the time. The inevitability of cyber-attacks and likely breaches weigh heavily on CISOs’ heads. How can zero-trust microsegmentation help?
Read MoreBy L L Seow | Friday, June 14, 2024, 11:25 AM Asia/Singapore | News, Newsletter
Respondents in a late-2023 survey across nine countries cited scaled-up cyber breaches, expanding attack surfaces and tightened regulatory compliance as catalysts
Read MoreBy CybersecAsia editors | Friday, May 24, 2024, 11:05 AM Asia/Singapore | News, Newsletter
With digitalization at fever pitch over the past years, have cyber threats raised greater awareness and appreciation for enhanced identity management?
Read MoreBy CybersecAsia editors | Friday, April 19, 2024, 10:01 AM Asia/Singapore | Case Study, News
With its physical and digital footprint growing, the global firm’s outdated legacy security stack has been replaced with AI-based cloud-centric platforms
Read MoreBy Nick Harders, SASE Director (APJ), HPE Aruba Networking | Tuesday, April 2, 2024, 11:29 AM Asia/Singapore | Tips
SASE is a security model, while Zero Trust is a security framework. Can the two solutions help unify networking/security teams?
Read MoreBy Dirk Dumortier, Director for Strategic Partnerships (APAC), Alcatel-Lucent Enterprise | Wednesday, January 3, 2024, 4:07 PM Asia/Singapore | Newsletter, Tips
In a ‘porous’ digital world with no easily-enforceable virtual boundaries, how can AI be used to enhance the zero trust model?
Read MoreBy CybersecAsia editors | Tuesday, November 28, 2023, 9:55 AM Asia/Singapore | News, Newsletter
Performance bottlenecks and lack of expertise have been major hurdles in the implementation of defensive measures around the world: survey
Read MoreIn today’s regulatory environments, data privacy and security are of paramount importance. But what would be the best approach to ensure the best possible protection and compliance?
Read More
PARTICIPATE NOW |
|