A Zero Trust Approach to Secure Access
A zero trust security model and secure remote access solution: The next step to a secure remote access
Read MoreSelect Page
By BeyondTrust and webmaster webmaster | Tuesday, September 7, 2021, 10:40 AM Asia/Singapore | Sponsored, Whitepapers
A zero trust security model and secure remote access solution: The next step to a secure remote access
Read MoreBy BlackBerry and webmaster webmaster | Thursday, August 26, 2021, 9:51 AM Asia/Singapore | Featured Content, Featured content 2022
With the pandemic turning our homes and cafés into part of the new ‘hybrid workplace’, the need for maximum corporate security is at an all-time high.
Read MoreBy Jonathan Jackson, Director, Engineering, BlackBerry and webmaster webmaster | Friday, July 2, 2021, 2:47 PM Asia/Singapore | Newsletter, Opinions
It may sound illogical to not trust people in order to gain their trust, but then, uncompromising cybersecurity works as such.
Read MoreBy BlackBerry and webmaster webmaster | Tuesday, May 25, 2021, 12:29 PM Asia/Singapore | BlackBerry What's-New
A comprehensive ‘prevent first’ and ‘protect first’ security approach to both endpoint security and network security is essential to remediate cyberthreats, as the numbers of connected enterprise endpoints grow and cloud migration accelerates.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, May 25, 2021, 9:12 AM Asia/Singapore | News, Newsletter
According to a recent study of large enterprises in Australia, Singapore and New Zealand, remote-working risks have escalated corporate cybersecurity concerns.
Read MoreBy Geoff Soon, Managing Director, South Asia, Snowflake and webmaster webmaster | Friday, May 21, 2021, 4:32 PM Asia/Singapore | Cloud Security, Data Protection, Newsletter, Tips
So goes the mantra: never trust, always verify; encrypt data; least privilege until more is justified; and surveil for abnormal behavior.
Read MoreBy BlackBerry and webmaster webmaster | Friday, April 23, 2021, 11:25 PM Asia/Singapore | BlackBerry, BlackBerry Whitepapers, Sponsored, Whitepapers
Security professionals are rethinking the way they approach access control and the security models for interconnected systems and users.
Security professionals have started looking at the entire environment as potentially untrusted or compromised versus thinking in terms of “outside-in” attack vectors.
Read MoreBy Greg Copeland, Technical Alliances Director, Keysight Technologies and webmaster webmaster | Monday, April 19, 2021, 11:46 AM Asia/Singapore | Newsletter, Opinions
Successful ZTA deployment requires a heterogenous approach including both security control and visibility components, argues this expert.
Read MoreBy CyberArk and webmaster webmaster | Tuesday, March 30, 2021, 9:12 AM Asia/Singapore | Infographic, Newsletter
With spear-phishing patterns shifting, CISOs are looking towards ‘zero trust’ models to cope.
Read MoreBy Serkan Cetin, Technical Director, APJ, One Identity | Thursday, December 10, 2020, 3:31 PM Asia/Singapore | Newsletter, Opinions
Placing no trust in anything may be the big thing next year.
Read MoreBy Prem Pavan, Area Vice President, Sales & Services, Asia, Citrix | Thursday, December 10, 2020, 3:27 PM Asia/Singapore | Newsletter, Opinions
While VPNs have their uses in securing the traditional workplace, will they suffice in a neo-distributed workforce? This expert says No.
Read MoreBy Victor Ng | Thursday, November 26, 2020, 11:45 AM Asia/Singapore | Features, Newsletter
As threats evolve with remote working becoming the norm, approaches to access governance and security postures need a rethink.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, November 24, 2020, 3:16 PM Asia/Singapore | News, Newsletter
The firm behind the invention of the term certainly wants this to happen, despite challenges, disparate mindsets and indigenous APAC circumstances.
Read MoreBy Daniel Comarmond, Asia-Pacific Security Engineer, Thycotic and webmaster webmaster | Tuesday, October 13, 2020, 5:16 PM Asia/Singapore | Newsletter, Opinions
Zero Trust is a buzzword that was coined by the cybersecurity industry FOR the cybersecurity industry, argues this expert.
Read MoreBy Mike Waring, Regional Director (Asia Pacific), Pulse Secure | Monday, October 12, 2020, 12:02 PM Asia/Singapore | Newsletter, Opinions
With distributed workforces becoming the norm, cloud-based network access requires tighter security via ZTN, argues this zero trust expert.
Read More
PARTICIPATE NOW |
|