Posts in cybersecurity

Scalable, Cloud-Native MDR Security Service is Now Available from NTT.

NTT Ltd., a leading global IT infrastructure and services company, today announced the launch of its Managed Detection and Response (MDR) security service to help companies achieve business...

Reimagining Your Endpoint Security to Alleviate the Growing Threat Landscape

Strong detection and response are mission-critical goals for most security teams but they are often overlooked. Multi-layered security has become absolutely vital. The problem is that no matter...

Leveraging a Managed Detection and Response (MDR) Provider to Anticipate Cybersecurity Threats

As the saying goes “prevention is always better than cure” but if you don’t know what’s wrong, how can you prevent it?   Cybersecurity has been a major topic of...

Detecting Advanced Attacks By Leveraging Advanced Security Analytics at Scale

The rapid adoption of emerging technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and cloud computing has exposed organisations to new cyber threats while also...

Spot by NetApp Delivers Cloud Desktop-as-a-Service Solution

NetApp®, a global, cloud-led, data-centric software company, announced the general availability of Spot PC, the managed cloud Desktop-as-a-Service (DaaS) solution — with security,...

Cisco and Government of Malaysia Reveal Collaboration Framework to Help Accelerate Digitisation

Malaysia's government and Cisco, a global leader in technology that powers the Internet, have announced a collaborative framework targeted at promoting Malaysia's national digitisation...

SMBs Should Use Digital Payments, Said More Than 1 in 2 of SEA Users

In Southeast Asia (SEA), more than half of e-finance users (67%) say that small and medium enterprises (SMBs) should start adopting digital payments for financial transactions. This is one of the...

In a World Full of Cyber Threats, Automated Security Is a Necessity

Speed is of the essence when it comes to cybersecurity. Upon detection of something remotely out of the ordinary, your IT security must plunge into action right away. It needs to recognise the...

A Handy Resource to Combat Cyber Attacks

Graph technology is about making sense of data. It enables a connections-first approach, gives organisations a 360-view of their data and allows decision-makers to identify patterns that would...

Your Passwords Can Be Hacked

The waves of change have brought humanity to the current digital age. We are living in the 4th Industrial Revolution marked by impactful technologies and platforms glued together by the Internet and...

Pages

Subscribe to RSS - cybersecurity