The Secure Access Service Edge - or SASE - model can help CISOs make incremental progress on enhancing security while designing a long-term strategy, says Siddharth Deshpande, director of security strategy for Asia-Pacific and Japan at Akamai Technologies.
Microsoft removed 18 apps from its Azure cloud platform that were being used by hackers as part of their command-and-control infrastructure. The threat group, called Gadolinium, was abusing the infrastructure to launch phishing email attacks, Microsoft researchers say.
Revisiting remote workforce security defenses, simplifying cloud access controls and pursuing risk-based vulnerability management and passwordless authentication are among the 10 security projects that all organizations should consider for this year and next, according to advisory firm Gartner.
The ephemeral and dynamic nature of cloud resources makes traditional security perimeters insufficient for successful risk management. The cloud needs a new perimeter - identity. Unfortunately, the complexity of the cloud infrastructure and cloud provider identity and access management (IAM) tools makes it...
Kubernetes has become the de facto operating system of the cloud. This rapid success is understandable, as Kubernetes makes it easy for developers to package their applications into portable microservices. However, Kubernetes can be challenging to operate. Teams often put off addressing security processes until they...
In the wake of the public health crisis of 2020, work-from-home orders issued by most companies and governments have further accelerated this digitalization and adoption of remote services. The expansion of the virtual workforce and adoption of cloud has emphasized the need for security and compliance in the...
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
Cloud migration still offers its fair share of speed bumps along the way. IT management has to keep pace even as digital business infrastructures become more complex with new cloud assets and networked devices. Security teams must ensure their organization's posture is secure even while releasing control over some key...
With cloud adoption on the rise, businesses have been transitioning to hybrid and multicloud environments at an incredible pace. In fact, Gartner predicts that 80% of enterprises will have entirely cloud-based infrastructures by 2025.
Having a strategy to mitigate the challenges of these new, complex infrastructures...
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
In this new era, every enterprise is suddenly "cloud first." But there are significant data security gaps to avoid before putting critical data in the cloud. Imperva's Terry Ray shares strategies to maximize simplicity and regulatory compliance.
In this Ebook on cloud security Ray discusses:
Biggest cloud security...
Threats have become a board-level concern and it's fueled a spending spree in security products over the last two years. So why don't companies feel more prepared to identify and respond to these threats?
For many organizations, disconnected point solutions have increased the complexity of their security...
Choosing the right security platform.
Finding a security platform for your organization can be a difficult task. In cybersecurity, the term “platform” has become overused, making it difficult to cut through the noise and understand which factors matter in choosing the best option for your business.
The...
The rapid shift to digital business models that use cloud services, such as SaaS and cloud service providers, is the latest development in the information revolution. Like other revolutions of the past, the change the cloud brings offers tremendous benefits as well as significant new challenges.
Read this guide to...
Multi-cloud is the new norm, and it's only getting more crowded. ESG findings show that "81% of current cloud infrastructure users are running two or more public cloud infrastructure providers", and of those users, "61% are using three or more". With all cloud providers offering logging and metrics services, you'd...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.