Tapping on the five pillars of the Zero Trust model
So goes the mantra: never trust, always verify; encrypt data; least privilege until more is justified; and surveil for abnormal behavior.
Read MoreSelect Page
By Geoff Soon, Managing Director, South Asia, Snowflake and webmaster webmaster | Friday, May 21, 2021, 4:32 PM Asia/Singapore | Cloud Security, Data Protection, Newsletter, Tips
So goes the mantra: never trust, always verify; encrypt data; least privilege until more is justified; and surveil for abnormal behavior.
Read MoreBy BlackBerry and webmaster webmaster | Friday, April 23, 2021, 11:25 PM Asia/Singapore | BlackBerry, BlackBerry Whitepapers, Sponsored, Whitepapers
Security professionals are rethinking the way they approach access control and the security models for interconnected systems and users.
Security professionals have started looking at the entire environment as potentially untrusted or compromised versus thinking in terms of “outside-in” attack vectors.
Read MoreBy Greg Copeland, Technical Alliances Director, Keysight Technologies and webmaster webmaster | Monday, April 19, 2021, 11:46 AM Asia/Singapore | Newsletter, Opinions
Successful ZTA deployment requires a heterogenous approach including both security control and visibility components, argues this expert.
Read MoreBy CyberArk and webmaster webmaster | Tuesday, March 30, 2021, 9:12 AM Asia/Singapore | Infographic, Newsletter
With spear-phishing patterns shifting, CISOs are looking towards ‘zero trust’ models to cope.
Read MoreBy Serkan Cetin, Technical Director, APJ, One Identity | Thursday, December 10, 2020, 3:31 PM Asia/Singapore | Newsletter, Opinions
Placing no trust in anything may be the big thing next year.
Read MoreBy Prem Pavan, Area Vice President, Sales & Services, Asia, Citrix | Thursday, December 10, 2020, 3:27 PM Asia/Singapore | Newsletter, Opinions
While VPNs have their uses in securing the traditional workplace, will they suffice in a neo-distributed workforce? This expert says No.
Read MoreBy Victor Ng | Thursday, November 26, 2020, 11:45 AM Asia/Singapore | Features, Newsletter
As threats evolve with remote working becoming the norm, approaches to access governance and security postures need a rethink.
Read MoreBy CybersecAsia editors and webmaster webmaster | Tuesday, November 24, 2020, 3:16 PM Asia/Singapore | News, Newsletter
The firm behind the invention of the term certainly wants this to happen, despite challenges, disparate mindsets and indigenous APAC circumstances.
Read MoreBy Daniel Comarmond, Asia-Pacific Security Engineer, Thycotic and webmaster webmaster | Tuesday, October 13, 2020, 5:16 PM Asia/Singapore | Newsletter, Opinions
Zero Trust is a buzzword that was coined by the cybersecurity industry FOR the cybersecurity industry, argues this expert.
Read MoreBy Mike Waring, Regional Director (Asia Pacific), Pulse Secure | Monday, October 12, 2020, 12:02 PM Asia/Singapore | Newsletter, Opinions
With distributed workforces becoming the norm, cloud-based network access requires tighter security via ZTN, argues this zero trust expert.
Read MoreBy Fortinet and webmaster webmaster | Monday, November 7, 2022, 8:53 AM Asia/Singapore | Sponsored, Whitepapers
Key things to know about CISO’s effective Zero-trust Access
Read MoreBy Fortinet and webmaster webmaster | Wednesday, March 23, 2022, 3:45 PM Asia/Singapore | Case Study, IoT Security, Sponsored
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.
Read MoreBy Andrew Milroy, Founder and Director, Veqtor8 and webmaster webmaster | Tuesday, August 31, 2021, 9:44 AM Asia/Singapore | Newsletter, Tips
When technology contain attack surfaces, accelerated digitalization creates a perfect storm for ransomware. What are the basics of staying safe?
Read MoreBy Fernando Serto, Director, Security Technology and Strategy (Asia Pacific), Akamai | Wednesday, December 16, 2020, 5:35 PM Asia/Singapore | Newsletter, Opinions
These are among the four factors that will define 2021, according to a content delivery network giant.
Read MoreBy L L Seow and Victor Ng | Friday, August 30, 2019, 9:08 AM Asia/Singapore | Cloud Security, Cybersecurity Strategies, Features, Mobile Security
High speed wireless connections and devices are redefining the digital landscape, and the...
Read More
PARTICIPATE NOW |
|