Password Standards: 2025 Requirements
Passwords are a pain for most users. While there has been talk of eliminating passwords, the alternatives are nowhere in sight. Will password tyranny continue in 2025, or is there hope of making cyberspace more user-friendly? The simple answer is that passwords will remain the de-facto and most popular authentication mechanism in 2025. Passwordless authentication […]
The State of Email Security in APAC
Three out of four organisations experienced at least one successful email attack last year. Such a revelation does not come as a surprise to the informed, though. Most companies in Australia and Singapore expect an email-borne cyberattack to harm their business this year. Of late, email has become the number-one attack vector for cybercriminals, and […]
How to Balance Business Security & Agility with Security Policy Automation
Agility is one of the core objectives of most digital transformation projects underway in enterprises. Agility speeds up time-to-market. It also makes the enterprise more responsive to the changing business environment. But security considerations often come in the way of agility. Many enterprises, cutting across size and scale, struggle to make the trade-off between security […]
Elements of a Successful Plan to Tackle Tomorrow’s Digital Security Risks
Protecting the digital ecosystem is critical for the survival of any enterprise today. Hackers have become more sophisticated than ever before. They deploy sophisticated tools to breach networks, increasing cyber-risks for the enterprise. A determined and focused hacker has many means to penetrate any network. For instance, they slip in an obfuscating link. An unsuspecting […]