In the second episode of ISMG's "APAC Insights" series, Raina Verma, AML and forensics expert, and Rubaiyyaat Aakbar, head of IT and cybersecurity at an insure tech startup, discuss problem solving in security and dealing with the complexities of the many data localization laws in APAC.
Shervin Evans began his career as a programmer but he always knew his future was in cybersecurity. Now, 20 years later as an information security officer, he evangelizes about cybersecurity to employees in his organization, his family and the broader community.
Curiosity is one of the most important traits for success in cybersecurity. Professionals in this field regularly face complex problems that require an inquisitive mind, and gamified, hands-on learning is one of the best ways to develop an inquisitive mindset.
New Mimecast CEO Marc van Zadelhoff talks about the integration of Elevate to manage human risk and the company's strategy for technological innovation. He also details plans for expanding Mimecast's presence in non-English-speaking markets and enhancing channel partnerships.
The United States Coast Guard in recent years has started to offer a range of cybersecurity services designed to enhance protections for the marine transportation system, but a new report reveals private sector stakeholders are reluctant to use the military branch.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
Cybersecurity is a shared challenge. In the diverse landscape of Asia, a collaborative approach is essential for building a robust security culture across the region.
Download this report which analyzes the current state of security awareness and identifies areas for improvement. Also:
Benchmark your organization...
Is your organization truly secure? Technology is important, but a strong security culture is the real key to safeguarding your systems and data. In this culture, security isn't just an IT headache – it's a shared responsibility woven into the fabric of your daily operations.
Download this guide to unveil the five...
Cybercriminals are weaponizing AI. Deepfakes, sophisticated phishing emails – the threat landscape is evolving at an alarming rate. But there's good news!
You can fight fire with fire.
Download this whitepaper to explore how AI-powered Security Awareness Training (SAT) can be your secret weapon against AI-wielding...
Cybersecurity and risk management leaders discussed the top leadership traits of a CISO at Information Security Media Group's Virtual Southeast Asia Summit on Thursday. Experts covered key CISO strategies that could help them stay ahead of cyberthreats.
Lorena Nunes, industrial cybersecurity specialist at Braskem, discusses how to bridge the cultural gap between IT and OT. She emphasizes the importance of building a cybersecurity culture and getting buy-in from leadership and rank-and-file employees.
In its annual fraud report released last week, the Reserve Bank of India sent an urgent warning to Indian banks to enhance scam controls and improve money mule management. The report highlights a significant surge in fraud cases on the Unified Payments Interface in India.
More than two-thirds of breaches involve the human element. Traditional security awareness initiatives, often fixated on training participation and engagements, are inadequate in mitigating incidents triggered by employees' risky behaviors, said Mimecast's Masha Sedova.
Creating and understanding risk profiles for individual users in an organization can help optimize the effectiveness of security awareness training, which is just one tool under the wider umbrella of human risk management, said Ashley Rose, founder and CEO of Living Security.
As cyber threats continue to become more sophisticated, many organizations focus on the technical aspects of defense. Budgets
are allocated for next-generation security controls and to properly staff security operations with expert analysts and threat hunters.
Too often, however, organizational leaders and IT...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.