CIO Academy Asia #HASHTECH Virtual Roundtable May 12, 2020 Given that in the “new normal” almost everyone is now working from home, there’s an accelerated adoption of remote working, mobile-access and cloud-based apps and tools. This results in large numbers of remote users accessing corporate networks, downloading and uploading data via their home-based Wi-Fi networks and routers. That, as well as a big...
#HASHTECH Unplugged! Securing the Enterprise in the COVID-19 Era Special Interview with Sherif El Nabawi, Vice President, Sales Engineering, Asia Pacific & Japan, CrowdStrike     The COVID-19 crisis is transforming the way we live, work and play. Businesses are now dependent on digital channels to engage employees, customers and suppliers. Working from home is the new normal, necessitating the widespread use of collaboration...
Cybersecurity_red
CIO Academy Asia #HASHTECH Insights April 13, 2020 The COVID-19 crisis is transforming the way we live, work and play. Businesses are now dependent on digital channels to engage employees, customers and suppliers. Working from home is the new normal, necessitating the widespread use of collaboration tools. The Southeast Asia Technology Trends and Priorities Survey Report published by CIO Academy Asia shows...
CIO Academy Asia #HASHTECH Insights April 6, 2020 The COVID-19 crisis is dramatically changing the way we live and work. For many people, it is leading to a need to work from home. Organisations must now ensure that they can operate, with unprecedented levels of remote working. A key consideration for organisations, as widespread remote working is thrust upon them, is cybersecurity. There...
Day 2 of the ConnectGov Leaders Summit held in Edinburgh, Scotland last July kicked off with Andrew Chang, Technology Consultant Lead, South East Asia and Greater China Region, RSA, reflecting on the first day’s scope of discussions. Key Takeaways Statistics from Gartner showing that 2% of surveyed CEOs wanted to embrace digital business but 71% expressed concerns over cybersecurity, IT...
Rapidly changing threat landscape forcing companies to redesign cyber-security strategies The huge increase in cyber threats have created what could be called as the perfect storm in corporate circles. Apart from a huge jump in human and bot-led cyber-attacks, there’s a slew of solutions purporting to fend off all manners of cyber-hits. This is compounded by a severe lack of...
How do you check that your endpoints such as laptops, tablets and mobile phones are secure while you wander through the world wide web? How do you ensure that only those with the right credentials are able to get access to resources on your company’s digital domains? For the former, check out Check Point. For the latter, dart over to...
Wouldn’t it be nice to know exactly what your customer wants when he or she calls your company’s hotline? Wouldn’t it be lovely to have insights about every single attack that your company faces and have that threat exterminated both internally and externally quickly? There are two Israeli companies that focus on doing just that. One is called NICE; and...
What do you do if hidden hardware devices such as ones attached surreptitiously behind ATM machines, or algorithms embedded in USB charging cables contain malware that may compromise your organisation’s security? On the other hand, what can you do if “supposedly safe” files such as pdf documents contain code to infect your critical systems? Are there any solutions that...
Given the rapid growth of cloud computing, large enterprises and government agencies, especially those in critical sectors like banking and healthcare, are wary about going all out on the public cloud. The biggest bugbear is security – or lack of it. How do you ensure your workloads on the cloud are secure against malware and hackers?