As security threats have evolved, organizations have deployed layers of security controls. How can leaders address the vulnerabilities within these incremental controls? Juniper's Paul shares insight.
When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value.
The pharmaceutical industry is data-rich, and CISOs of the sector face a huge challenge in protecting its intellectual property. GlaxoSmithkline's Steve Williamson offers tips for securing the data lifecycle.
Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
Is the Information Assurance practice helping Qatar's security leaders manage risks and security better? QCERT's Ashraf Ali Ismael shares insights on how security leaders are embracing the IA concept.
The banking sector in the Middle East region faces growing challenges from phishing attacks and APTs. Banque Saudi Fransi's Osman asks: Have CISOs learned their lessons and made adjustments after past attacks?
The IT security industry must do a much better job of persuading young people with the requisite math and science skills to join the cybersecurity workforce rather than choose another profession, says David Shearer of (ISC)².
What are some of the unique security challenges facing Asian organizations, and how can they meet them? Steve Durbin of the global Information Security Forum shares insight from new research.
Do CISOs need mentoring? Daniel Lohrmann shares insights on the importance of mentoring CISOs to enable them to spot growth opportunities and also to build up their interpersonal skills.
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the banking industry's greatest wire fraud worries. These schemes threaten to overshadow what the industry previously saw from commercial account takeover incidents.
In...
Gulf Air in the Middle East has become one of the region's early adopters of the cloud. What are the challenges for security team to secure data in the cloud? Gulf Air's Jassim Haji shares insight.
In developing markets such as Asia and the Middle East, how can security practitioners best prepare themselves to tackle the rapidly-changing threat landscape? Resilience is the key, says security leader Bruce Schneier.
As organizations increasingly focus on securing critical data, they mustn't overlook one huge vulnerability: enterprise email. Steven Malone of Mimecast discusses the latest in unified email management.
Mark Clancy, CEO of Soltra, which provides an automated information sharing platform, says banks and credit unions that don't share threat intelligence will never advance their information risk management practices.
Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.