CFOtech Asia - Technology news for CFOs & financial decision-makers

Best Practice stories - Page 75

Thinkstockphotos 658058278

Security expert comments on spearphishing attacks against Singapore universities

Fri, 6th Apr 2018
#
malware
#
cybersecurity
#
cyber security agency of singapore
An Iran-based hacking group has compromised 52 staff accounts at four Singapore universities, exposing over 31 terabytes of sensitive data.
Thinkstockphotos 462147521

The 475-day siege: APAC firms' breach detection times are getting worse

Thu, 5th Apr 2018
#
malware
#
breach prevention
#
cybersecurity
Asia Pacific organisations take over a year to detect cyber threats, the longest of any region, according to FireEye's M-Trends 2018 report.
Thinkstockphotos 846251202

Attackers exploit macro-less Office documents to create havoc

Tue, 3rd Apr 2018
#
malware
#
firewalls
#
network infrastructure
Cybercriminals use Microsoft Office documents to conduct 'macro-less' attacks that dodge organisations' defences and inject malware.
Thinkstockphotos 584207196

China Mobile and Huawei Cloud alliance set to boost cloud in Southeast Asia

Wed, 28th Mar 2018
#
hybrid cloud
#
multi-cloud
#
cloud services
The aim of the portfolio will be to make it easier for enterprises to migrate to the cloud while providing a secure platform for global connectivity.
Smart city

APAC Smart Cities spending to reach $28.3bil in 2018 - IDC

Tue, 27th Mar 2018
#
wearables
#
smart cities
#
mobility
Key investments for Asia Pacific Smart Cities are in intelligent transportation, data-driven public safety, and resilient energy and infrastructure.
Digital map2

Polycom dials up APAC CX strategy with new appointment

Tue, 27th Mar 2018
#
crm
#
uc
#
cx
Andrew Hug will lead the charge creating a customer-focused strategy that combines securing customer insights and analysis.
Thinkstockphotos 668344470

Google rolls out phishing prevention amongst new G Suite security features

Mon, 26th Mar 2018
#
mfa
#
phishing
#
email security
Updates include phishing prevention, mobile device management, security keys for two-factor authentication, Information Rights Management, and more.
Thinkstockphotos 522489079

Businesses face 'cyber black holes' without complete visibility

Fri, 23rd Mar 2018
#
iot security
#
forescout technologies
#
network visibility
High-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.
Billington award 5nm98d5

CSA chief David Koh recognised for contributions to Singapore's cybersecurity prowess

Thu, 22nd Mar 2018
#
cybersecurity
#
healthtech
#
csa
David Koh, chief of CSA, honoured with Billington CyberSecurity International Leadership Award for pioneering Singapore's cybersecurity advancements.
Screen shot 2018 03 21 at 4

Expert says thriving IoT security market “shouldn't surprise anyone”

Thu, 22nd Mar 2018
#
iot security
#
iot
#
cybersecurity
After Gartner forecast IoT security spending to hit US$3.1b in 2021, Huntsman's Piers Wilson says IoT vulnerabilities are being found all the time.
Thinkstockphotos 861132530

Learning from the past to protect the future of IoT and cloud

Mon, 12th Mar 2018
#
cloud security
#
iot security
#
iot
Cyber attackers are likely to use known vulnerabilities this year despite advancements in their threats, says ForeScout.
Screen shot 2018 03 07 at 3

Blueliv makes plea for cybercrime intelligence sharing across industries

Thu, 8th Mar 2018
#
malware
#
uc
#
data privacy
With malware continually evolving, Blueliv says it's crucial that the 'good guys' begin to collaborate in the fight against cybercrime.
Big data7

Secondary data – the paradigm-shifting resource overlooked by businesses

Tue, 6th Mar 2018
#
data analytics
#
martech
#
planning
Secondary data has become elevated within the business as its value is uncovered across a number of key areas.
Thinkstockphotos 578307972

Email: The often ignored factor in strong cybersecurity

Tue, 27th Feb 2018
#
uc
#
phishing
#
email security
A customer-facing organisation will receive hundreds, if not thousands of emails every day, each one containing personal identifiers.
Pexels photo 355948

Cisco report finds AI & machine learning still hot topics in cybersecurity

Mon, 26th Feb 2018
#
supply chain
#
ai
#
cybersecurity
AI & machine learning in cybersecurity prove to be hot topics amongst security professionals and they're looking to spend more on those tools.
Iot3

How CIOs can implement a successful IoT strategy

Wed, 21st Feb 2018
#
digital transformation
#
iot
#
software ag
Before jumping on the IoT bandwagon, CIOs need to take a step back and carefully create a viable IoT strategy.
Screen shot 2018 02 20 at 10

INTERVIEW: Kao Data celebrates new London data centre and chairman

Tue, 20th Feb 2018
#
datacentre infrastructure
#
hyperscale
#
dc
After launching a data centre campus in London and hiring a new chairman, we spoke to Kao's COO about some of the technical aspects of the facility.
Thinkstockphotos 685774780

The risks of DDoS and why availability is everything

Tue, 20th Feb 2018
#
ddos
#
arbor networks
#
netscout
We've all experienced the feeling of frustration, or even desperation, when the online services we expect are not available when we need them.
Thinkstockphotos 641517852

United States hot on heels of North Korea's Hidden Cobra malware

Mon, 19th Feb 2018
#
malware
#
ddos
#
cybersecurity
The United States Computer Emergency Readiness Team (US-CERT) is honing in on the North Korean Government's activities known as HIDDEN COBRA.
Thinkstockphotos 865331998

AWS and SUSE expand collab to boost SAP migration to cloud

Thu, 15th Feb 2018
#
migration
#
hyperscale
#
public cloud
SUSE has expanded their collaboration with Amazon Web Services to further accelerate SAP migrations to Linux on AWS.