Data Security

  • Spotting the differences between SSH and Telnet
    Data Security Nov 29, 2022 3 min

    Spotting the differences between SSH and Telnet

    SSH and Telnet are two communication protocols that help users establish...

    Read more 
  • What is a security operation center and what should you know about it?
    Data Security Nov 21, 2022 5 min

    What is a security operation center and what should you know about it?

    A security operations center (SOC) is an enterprise monitoring...

    Read more 
  • Cyberwar games: An effective strategy for enhanced cyberdefense
    Data Security Nov 09, 2022 5 min

    Cyberwar games: An effective strategy for enhanced cyberdefense

    War games are not new. Armed forces throughout history have been...

    Read more 
  • 7 cybersecurity trends to watch for in 2023
    Data Security Oct 31, 2022 4 min

    7 cybersecurity trends to watch for in 2023

    Whether it is the never-ending list of compliance requirements to follow...

    Read more 
  • Singapore has adopted Zero Trust in government
    Data Security Oct 28, 2022 4 min

    Cloud security and data governance top security challenges for tech execs in 2022: Forrester

    Forrester's recent report, The State of...

    Read more 
  • Singapore has adopted Zero Trust in government
    Data Security Oct 18, 2022 5 min

    Singapore has adopted Zero Trust in government

    Lately there have been multiple instances of large-scale cyberattacks on government...

    Read more 
  • e-Estonia: Shedding light on Estonia's digital adoption and its cyberdefense model
    Data Security Oct 11, 2022 6 min

    e-Estonia: Shedding light on Estonia's digital adoption and its cyberdefense model

    Estonia has emerged as a global leader...

    Read more 
  • Aligning Zero Trust with the Essential Eight
    Data Security Oct 06, 2022 5 min

    Aligning Zero Trust with the Essential Eight

    The COVID-19 pandemic has stimulated a major digital transformation, but security...

    Read more 
  •  Map these 2 security frameworks to strengthen your cyberdefense
    Data Security Sep 29, 2022 6 min

    Map these 2 security frameworks to strengthen your cyberdefense

    A good cybersecurity plan exceeds its primary objective of protecting your enterprise data.

    Read more 
  • Why SIEM is a surefire way to help IT teams achieve SOX compliance
    Data Security Sep 23, 2022 6 min

    Why SIEM is a surefire way to help IT teams achieve SOX compliance

    Accounting firms, auditors, and all publicly listed companies experienced a pivotal...

    Read more 
  • Cybersecurity in healthcare: Part 2
    Data Security Sep 19, 2022 7 min

    Cybersecurity in healthcare: Part 2

    If you're excited about exploring how healthcare organizations can fortify their cyberdefenses to protect...

    Read more 
  • Cybersecurity in healthcare: Part 1
    Data Security Sep 08, 2022 7 min

    Cybersecurity in healthcare: Part 1

    Healthcare organizations are arguably the most popular targets for cyberattacks. According to the latest report...

    Read more 
  • What to keep in mind before diving into the murky waters of cyber insurance
    Data Security Aug 24, 2022 4 min

    What to keep in mind before diving into the murky waters of cyber insurance

    Where there's risk, there's insurance. In a field like cybersecurity that's overflowing...

    Read more 
  • 4 must-know GDPR principles for IT compliance
    Data Security Jul 29, 2022 6 min

    4 must-know GDPR principles for IT compliance

    The EU has recently approved two important acts: the Digital Services Act and the Digital Markets Act.

    Read more 
  • Zero Trust: The journey towards a secure network
    Data Security Jul 26, 2022 6 min

    Why the OAIC's proposed online privacy bill is going to be a game-changer for Australian internet privacy

    In the age of cookies, artificial intelligence, and targeted digital advertising...

    Read more 
  • Zero Trust: The journey towards a secure network
    Data Security Jul 14, 2022 6 min

    Zero Trust: The journey towards a secure network

    Do you trust your organization's network? Do you think deploying perimeter-based security solutions such as firewalls or VPNs is enough

    Read more 
  • Getting started with ISO 27001? Here's what you need to know
    Data Security May 26, 2022 6 min

    Getting started with ISO 27001? Here's what you need to know

    The ISO 27000 family of standards acts as an information security management framework for institutions around the world.

    Read more 
  • Essential Eight explained: ACSC's key security controls for organizational cybersecurity
    Data Security May 12, 2022 6 min

    Essential Eight explained: ACSC's key security controls for organizational cybersecurity

    In February, during the onset of the Russia-Ukraine war, the Australian Cyber Security Center (ACSC) sent out a key...

    Read more 
  • Security streams you must know to commence your career in cybersecurity: Part 2
    Data Security Apr 28, 2022 6 min

    Security streams you must know to commence your career in cybersecurity: Part 2

    Hi, there! It's nice to see you again. If you're excited about exploring a few more vital security streams, you won't be disappointed.

    Read more 
  • Protecting payment card information with PCI-DSS
    Data Security Apr 22, 2022 6 min

    Protecting payment card information with PCI-DSS

    The Payment Card Industry Data Security Standard (PCI-DSS) was first introduced in 2004 by the credit card giants American Express, MasterCard, Visa, and Discover.

    Read more 
  • Insider threat: The enemy is under your roof
    Data Security Apr 21, 2022 4 min

    Insider threat: The enemy is under your roof

    Research conducted by Ponemon Institute shows that from 2018 to 2020, the number of insider threats has increased 47% and the cost of these incidents escalated to $11.45 million.

    Read more 
  • Security streams you must know to commence your career in cybersecurity: Part 1
    Data Security Apr 18, 2022 6 min

    Security streams you must know to commence your career in cybersecurity: Part 1

    Digital transformation is a double-edged sword, as evidenced by the increasing cases of cyberattacks.

    Read more 
  • diversity-equity-inclusion-foster-better-cybersecurity-teams
    Data Security Apr 01, 2022 6 min

    DEI-friendly organizations foster better cybersecurity teams

    As cybercriminals come up with new ways to penetrate systems, it is important to cultivate and explore various perspectives for better defense against advanced threats.

    Read more 
  • book-review-cybersecurity-the-beginners-guide
    Data Security Mar 23, 2022 4 min

    A review of Dr. Erdal Ozkaya's book Cybersecurity: The Beginner's Guide

    The book Cybersecurity: The Beginner's Guide, authored by Dr. Erdal Ozkaya, covers a broad scope of topics, from the importance of cybersecurity..

    Read more 
  • cybersecurity-frameworks-first-priority-in-2022
    Data Security Feb 24, 2022 6 min

    Why cybersecurity frameworks should be your No.1 priority in 2022

    Interested Engineering, a science and technology web site says, "F-35 fighter jets are more susceptible to cyberattacks than missiles.

    Read more 

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.