Data security predictions 2021
By Splunk | Mar 4, 2021 | Sponsored, Whitepapers | 0
MDR checklist for your Splunk environment
By Proficio | Mar 4, 2021 | Sponsored, Tips, Whitepapers | 0
Tokenization helps Indonesian financial technology...
By Thales | Mar 1, 2021 | Sponsored, Whitepapers | 0
Cyberchat between Proficio and Splunk
By Proficio | Mar 4, 2021 | Sponsored, Video, Whitepapers
Listen in as two experts discuss how CISOs and cybersecurity teams can better articulate the needs and challenges of modernizing SOCs today.
Read MoreData security predictions 2021
By Splunk | Mar 4, 2021 | Sponsored, Whitepapers
Zero Trust, ‘vishing’ and strategic approaches to a chaotic, rapidly evolving world.
Read MoreMDR checklist for your Splunk environment
By Proficio | Mar 4, 2021 | Sponsored, Tips, Whitepapers
Is your managed detection and response (MDR) service provider giving you the best security services possible?
Read MoreTokenization helps Indonesian financial technology and service provider with PCI compliance
By Thales | Mar 1, 2021 | Sponsored, Whitepapers
The company needed to comply with PCI-DSS to securely exchange data with customers and partners.
Read MoreWebinar: The 2021 threat forecast
By BlackBerry | Mar 1, 2021 | Sponsored, Video, Whitepapers
Join this on-demand session for a peek into the threat landscape in 2021…
Read More2020 Gartner Magic Quadrant for Application Security Testing
By Synopsys | Feb 16, 2021 | Sponsored, Whitepapers
Synopsys placed highest for both the ability to execute and completeness of vision.
Read More2020 Open Source Security and Risk Analysis report
By Synopsys | Feb 16, 2021 | Cybersecurity Strategies, Sponsored, Whitepapers
Here’s your personal copy of one of the industry’s most important analysis report.
Read MoreCybersecurity: Looking at 2021 with BlackBerry
By BlackBerry | Feb 9, 2021 | Sponsored, Video, Whitepapers
Listen in as cybersecurity experts from BlackBerry discuss the cyber-threat landscape in 2021.
Read MoreContinuous security – putting it all together
By Colin Bell, HCL AppScan CTO | Feb 4, 2021 | Opinions, Software Development Lifecycle Security, Sponsored, Whitepapers
The pillars of continuous security – audit, metrics and governance working together.
Read MoreContinuous application security with HCL AppScan
By ESG | Feb 4, 2021 | Software Development Lifecycle Security, Sponsored, Whitepapers
IT is not getting easier; in fact, it’s getting more complex and dangerous.
Read MoreKorean hospital opts for Vormetric Transparent Encryption to enhance security
By Thales | Feb 1, 2021 | Sponsored, Whitepapers
The final piece of its security strategy puzzle was an encryption solution that could work seamlessly with both structured and unstructured data.
Read MoreWebinar: Choosing the right secure messaging solution for your business
By BlackBerry | Jan 28, 2021 | Sponsored, Video, Whitepapers
Join this on-demand panel discussion on choosing the right messaging and collaboration solution for your organization.
Read MoreThe state of the security team
By LogRhythm | Jan 25, 2021 | Sponsored, Whitepapers
A global survey of cybersecurity professionals finds out if corporate executives are the problem.
Read MoreUntangling the web of cloud security threats
By Trend Micro | Jan 20, 2021 | Sponsored, Whitepapers
The challenges of unfamiliarity with the cloud extends to cloud security, misconfiguration, threats and risks.
Read MoreThe ultimate guide to CSPM
By Horangi | Jan 14, 2021 | Sponsored, Whitepapers
What is Cloud Security Posture Management (CSPM), and how do you choose the right one for your organization?
Read MoreWebinar: Best practices for teleworkers at scale
By Fortinet | Jan 14, 2021 | Sponsored, Video, Whitepapers
Learn how your organization could more effectively provision network bandwidth, support and security for your growing remote workforce.
Read MoreMaximize the ROI of detection and response
By Palo Alto Networks | Jan 14, 2021 | Sponsored, Whitepapers
Cut costs by 44% by consolidating tools and streamlining operations for cyber-threat detection and response.
Read MoreHealthcare organization addresses cloud access management challenges
By Thales | Jan 5, 2021 | Sponsored, Whitepapers
Healthcare and recruitment data are some of the most sensitive information, and need special protection when exchanged and managed in the cloud.
Read MoreAn actionable guide to complying with Malaysia’s Risk Management in Technology (RMiT)
By BeyondTrust | Jan 4, 2021 | BeyondTrust Articles, Sponsored, Whitepapers
Here’s a practical guide to mapping BeyondTrust solutions to Malaysia’s RMiT framework for protecting financial systems.
Read MoreThe 5 critical steps in your endpoint security strategy
By BeyondTrust | Jan 4, 2021 | BeyondTrust Articles, Sponsored, Whitepapers
Endpoint security requires an ecosystem – not a single standalone solution.
Read More
Whitepapers
Cyberchat between Proficio and Splunk
Listen in as two experts discuss how CISOs and cybersecurity teams can better articulate the …Download WhitepaperData security predictions 2021
Zero Trust, ‘vishing’ and strategic approaches to a chaotic, rapidly evolving world.Download WhitepaperMDR checklist for your Splunk environment
Is your managed detection and response (MDR) service provider giving you the best security services …Download WhitepaperTokenization helps Indonesian financial technology and service provider with PCI compliance
The company needed to comply with PCI-DSS to securely exchange data with customers and partners.Download Whitepaper
Case Studies
Idaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read moreLeading Malaysian developer zeroes in on threats with LogRhythm
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. …Read more