Security | News, how-tos, features, reviews, and videos
Ken Soh, CIO of BH Global, outlines how the Singapore-based organisation built out a cyber strategy through a creation of a dedicated startup business
A well-laid plan, with all the stakeholders involved upfront, is the first step in building a more secure container environment.
Itu2019s impossible to establish a security culture within a modern enterprise if it doesnu2019t already exist within IT. IT organizations should have pervasive and conspicuous security cultures that can serve as examples to all other parts of a cor
Companies particularly in the UAE are quickly implementing cloud solutions, but with GDPR in play, data sovereignty is now top of the IT agenda.
While leading in digital transformation, TMT companies are more vulnerable to cyber-threats, research finds.
The cloud is essentially a dark pool of computational power and that mystery can lull us into complacency. Hereu2019s what you donu2019t know about keeping your data secure in the cloud.
Are you starting a cybersecurity plan from scratch? Check our list of essential steps to make it a successful one
Protecting data is only going to get tougher. Are CIOs ready to protect what is the most important enterprise asset?
Organizations see a future in which IT security is deeply woven into their overall IT strategy. Hereu2019s how they plan to get there.
But it is not likely to improve privacy protection very much.
Sponsored Links