The State of Email Security in APAC
Three out of four organisations experienced at least one successful email attack last year. Such a revelation does not come as a surprise to the informed, though. Most companies in Australia and Singapore expect an email-borne cyberattack to harm their business this year. Of late, email has become the number-one attack vector for cybercriminals, and […]
Leveraging Big Data for Enhanced Protection of Cloud Accounts Against Cyber Criminals
Cyber criminals have become relentless in their attacks against cloud accounts. They use every trick in the book to compromise cloud accounts. After gaining access, they launch internal phishing, data theft and email fraud through such accounts. Of late, they have intensified brute force attacks to guess passwords and exploit weak authentication. Today, about 45% […]
The role of cloud security in protecting sensitive data
Enterprises have been migrating data and applications to the cloud over the years for good reasons. The cloud improves data accessibility, enhances collaboration and eases content management. But cloud security remains a concern for many CIOs and enterprise leaders. They feel moving to the cloud will raise governance, safety, and compliance issues. At the end […]
How to Find the Right Cloud Content Services Platform for your Cloud Journey
Cloud adoption is increasing as enterprises discover the benefits on offer. But cloud adoption is not easy. Cloud success depends on deploying the right services. One of the essential cloud services is a cloud content service platform. The platform enables the storage, management, and distribution of digital content. The platform hosts the content on remote […]
What is a Cloud Access Security Broker (CASB)?
Enterprises that ignore cyber-security live dangerously. Cyber crimes have become more complex over the years. Threats like ransomware have gone out of hand, with attackers striking at will and cyber security helpless to thwart attacks. The cloud renders traditional security models redundant. Enterprises have no option but to overhaul their security models and apparatus. Cloud […]
Transitioning to Cloud Analytics? Be Aware of these Five Challenges
Cloud-based analytics are soaring in popularity. Enterprises transition from on-premises to the cloud for easy scalability, flexibility, and cost-effectiveness. But cloud analytics comes with its fair share of challenges. This tech blog for IT professionals lists the key challenges with cloud analytics and how to overcome them. CHALLENGE #1: Getting On-Premises Data into the Cloud […]
Top Security Best Practices for Hybrid and Multi-Cloud Models
Multi-cloud and hybrid-cloud models are the rage. About 94% of enterprises today deploy a mix of public and private clouds and run a host of SaaS applications. Multi-cloud and hybrid-cloud environments distribute workloads to improve enterprise agility and flexibility. But these deployments are also complex and raise fresh security challenges. For instance, common east-west traffic, […]
Cloud Strategies and Priorities for Tech Decision Makers in 2020
Enterprises embrace the cloud in large numbers as the benefits become more and more evident. Here are some cloud priorities and strategies for tech decision-makers in 2020, to get the best results out of the cloud. Building and Maturing Next-Gen Cloud-Based Solutions IT teams have been building cloud-based systems for some time now. The priority […]
5 Big Network Security Breaches in 2019 and What’s in Store for 2020
It has been a cat and mouse game between cybercriminals and network security for many years now. Security has improved leaps and bounds. But cybercriminals still attack at will. Here are some major heists in 2019. The Big Breaches of 2019 January 2019: The Month of Data Breaches Many big-time data breaches took place in […]