Mass targeted attacks often need a big event as the pivot to grab the prospective victims' attention. Using the example such of a phishing campaign, Symantec's Narang shares insight on how low awareness impacts the region.
Cloud-based cybersecurity solutions increasingly are becoming the best option for securing websites while simultaneously speeding up web page load times for your customers. In addition, cloud-based edge solutions like CloudFlare also block threats through website application firewalls, DNS services and DDoS...
The big companies make the big headlines, but the midsized entities are really the growing attack targets, says Dick Williams, CEO of Webroot. In this video interview, he discusses how new tools and services are serving this expanding market.
More cybercriminals are adapting their attack techniques, using compromised credentials linked to privileged accounts to invade networks and systems, according to researchers at Dell SecureWorks, who describe an open source solution that can help mitigate the threat.
Malwarebytes has long been a force in the consumer space, but now its focus is on enterprise breach remediation. In this video interview, Pedro Bustamante explains the enterprise strategy and discusses proactive malware hunting.
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
Simple conversations live at the heart of business. Migration to SIP enables you to have those conversations with customers, colleagues and partners with far greater reliability and security - and at significantly lower overall costs.
Download this infographic to explore the benefits of SIP and what to expect...
It's been just over a year since health plan Anthem Inc. reported a record-breaking hacker attack affecting nearly 79 million individuals. A number of key lessons have emerged from that breach that other organizations can apply to improve their own data security.
Could computing has gone from being the latest and greatest in technology innovation, to being the norm today. And security of data in the cloud is a concern that is constantly growing. WinMagic COO Mark Hickman shares challenges, advice.
HTTPS isn't what it used to be. In this whitepaper, you'll learn SSL/TLS best practices for securing modern websites, such as HSTS header support, use of SHA-2, and enabling forward secrecy. But, modern SSL doesn't just better secure your site; it's designed for performance, too.
You'll also discover some common...
Although DoS attacks are not a recent phenomenon, the methods and resources available to conduct and mask such attacks have dramatically evolved to include distributed (DDoS) and, more recently, distributed reflector (DRDoS) attacks. These attacks simply cannot be addressed by traditional on-premise solutions....
Jeff Shaffer, a former Secret Service agent, has investigated cybercrime for more than 25 years. Now a manager at PricewaterhouseCoopers, he discusses how organizations can protect their assets better by understanding their attackers' MO.
With the U.S. accelerating its adoption of the EMV chip, encryption and tokenization, life is going to get tougher for fraudsters, and card-not-present fraud will rise, says PCI Council Director Jeremy King. Regions with poor data security must beware.
When it comes to threat detection, spotting malicious insiders is one thing. They often leave a trail. But how do you protect against the accidental insider threat? Organizations need to deploy tools such as spam filters, secure gateways and sandboxing technologies to help
mitigate the vulnerabilities introduced by...
Hong Kong toymaker VTech has revised its end-user license agreement to make clear that it can't be held legally responsible for any data breaches. Many security experts have reacted with fury. But is VTech's move unusual?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.