CONTRIBUTED CONTENTS

Publications

27 Nov 23 (Cisco) Cisco Leader in Omdia Universe RBVM Solutions 2023
27 Nov 23 (Cisco) ESG eBook: Keys to Successful SSE
27 Nov 23 (Cisco) Forrester Report: Top Cybersecurity Threats in 2023
22 Nov 23 (LogRhythm) Lack of skilled professionals, not cost, the principal barrier to adoption of AI among Asia-Pacific businesses: LogRhythm channel partners
4 Aug 23 (Cisco) The Forrester Wave™ Network Analysis And Visibility, Q2 2023
31 Jul 23 (Cisco) What’s in a Name? The XDR for 2023 and beyond
7 Jul 23 (Cisco) Forrester TEI Report: Total Economic Impact of Cisco Duo
7 Jul 23 (Cisco) e-book: Introducing Cisco Secure Access
7 Jul 23 (Cisco) Forrester Wave™: Network Analysis And Visibility, Q2 2023
7 Jul 23 (Cisco) e-book: 5 Ways to Experience XDR
7 Jul 23 (Cisco) e-book: Cisco XDR: Security Operations Simplified
7 Jul 23 (Cisco) Cybersecurity Readiness Index
4 Jul 23 (IQPC) DDoS attacks are the most impactful threat vector in APAC
22 Jun 23 (Mandiant, Google Cloud) Mandiant Cyber Security Forecast 2023
22 Jun 23 (Mandiant, Google Cloud) M-Trends 2023 Executive Summary
13 Jun 23 (IQPC) Top Five APAC Government Hacks of 2023 (so far)
25 Apr 23 (Schneider Electric) Embracing Zero Trust: Logical and Physical Segmentation (Blog 3 of a 7-blog series)
18 Apr 23 (IQPC) How to Create an AI Strategy for the Cloud
28 Mar 23 (Votiro) 14 Lessons Learned from a Ransomware Survivor - Votiro Cloud
28 Mar 23 (Votiro) Ultimate Guide to CDR
17 Mar 23 (SecurityScorecard) Addressing the Trust Deficit in Critical Infrastructure
16 Mar 23 (GlobalSign) Automate Your PKI: GlobalSign’s Auto Enrollment Gateway (AEG) Solution
4 Mar 23 Tenable 2022 Threat Landscape Report
28 Feb 23 (IQPC) The Top 9 Hacks, Data Breaches and Cyber Security Threats in APAC
24 Feb 23 (Fortinet) 2022 Global Threat Landscape Report
20 Feb 23 (Anil Kasula) Mobile App Development Trends And Best Practices
15 Feb 23 (Anil Kasula) AI in Education System
18 Jan 23 (Schneider Electric) Embracing Zero Trust: Verification, Visibility, and Validation (Blog 1 of a 7-blog series)
18 Jan 23 (Cisco) Security Outcomes Report, Volume 3
18 Jan 23 (Cisco) Defending Against Critical Threats
18 Jan 23 (Cisco) Talos Year in Review 2022
4 Jan 23 (GlobalSign) The Ideal Authentication Method for Small Businesses
4 Jan 23 (GlobalSign) What is Authentication? | Types of Authentication
21 Dec 22 (Tenable) 2022 Gartner Exposure Management Report
21 Dec 22 (Tenable) MANAGING RISK IN THE METAVERSE
21 Dec 22 (Tenable) A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations
21 Dec 22 (Tenable) Eliminating Attack Paths in Active Directory: A closer look at preventing privilege escalations
16 Dec 22 (Elastic) 2022 Elastic Global Threat Report
7 Dec 22 (GlobalSign) Why Choose EV Code Signing over Standard Code Signing?
7 Dec 22 (GlobalSign) Internet of Things in Singapore: A Future Landscape
19 Oct 22 Log4j Vulnerability: Impacts on Network Security and How to Fix the Issue
6 Oct 22 (GlobalSign) HTTP/3: Has your company adopted it yet?
6 Oct 22 (GlobalSign) How Certificate-Based Authentication Works
6 Oct 22 (GlobalSign) How to Identify and Avoid Phishing Attacks
13 Sep 22 (GlobalSign) What can you do with a Secure Email (S/MIME Certificate)?
13 Sep 22 (GlobalSign) Ensuring Industry Compliance: GMO Sign and FDA’s 21 CFR Part 11
Aug 22 (GlobalSign) How to Make a PDF Signature
Aug 22 (GlobalSign) Difference and Similarities: Digitization, Digitalization, and Digital Transformation
Jul 22 (GlobalSign) Security Solutions that can Help Transform Your Startup Business
Jul 22 (GlobalSign) Can Digital Signatures Be Forged?
Jul 22 (Lookout) Securing Access To Your Apps With A Zero Trust Approach
Jul 22 (Lookout) Lookout Secure Web Gateway
Jul 22 (Lookout) Remote collaboration requires endpoint-to-cloud data security
Jul 22 (Lookout) CISO's Guide for Securing the Remote Workforce
Jul 22 (Lookout) As Organizations Evolve, So Does Ransomware
Jun 22 (Nozomi Networks) Industroyer vs. Industroyer2: Evolution of the IEC 104 Component
Apr 22 (Elastic) Unified search for finding workplace content
Apr 22 (Elastic) Implementing Search for Your Knowledge Base
Apr 22 (Elastic) Guide to high-volume data sources for SIEM
Apr 22 (Elastic) Get more operational value from your SIEM
Apr 22 (Elastic) Leveraging observability to build better applications
Apr 22 (Elastic) Data building blocks for an observability solution
03 Mar 22 (BCG) The Future of Women in Cybersecurity
Feb 22 (IBM) Security X-Force Threat Intelligence Index 2022
19 Feb 22 (Cisco) Securing Hybrid Work in the Public Sector
15 Feb 22 (Cisco) Digital Transformation and Cybersecurity in the Public Sector
9 Feb 22 (GlobalSign) Digital Transformation in the Manufacturing Industry
Feb 22 (CyCognito) Rethink Penetration Testing
Feb 22 (CyCognito) Maximizing Security Value Through External Attack Surface Management
Feb 22 (IronNet) Collective Defense; A radar-like view of cyber threats.pdf
Jan 22 (Cisco) Read Cisco's latest cybersecurity report to understand how 5 practices can put you ahead of 79% of organizations
Jan 22 (Recorded Future) Patch What Matters with Risk-Based Vulnerability Management
Jan 22 (Recorded Future) Security Intelligence: Driving Security from Analytics to Action
Dec 21 (Saviynt) The Total Economic Impact™ Of Saviynt Enterprise Identity Cloud
20 Dec 21 (Cisco) 3 Technology Trends in the Future of Government
10 Dec 21 (Tanium) How Tanium Can Help with CVE-2021-44228: Log4Shell
Nov 21 (Recorded Future) The Total Economic Impact™ Of Recorded Future Intelligence Platform
26 Nov 21 (CISCO) Cybersecurity for SMBs: Asia Pacific Businesses Prepare for Digital Defense
26 Nov 21 (CISCO) 2021 Frost & Sullivan Market Leadership Report
26 Nov 21 (CISCO) The Total Economic Impact (TEI) of Cisco SecureX
Sep 21 (IBM) Cost of a Data Breach Report
Sep 21 (SecurID) Passwordless Authentication: The Time Is Now, and Help Is Here
31 Aug 21 (SecurID) Data Access Governance: Control, Access and Use Unstructured Data
4 Aug 21 (Acronis) Acronis Cyberthreats Report: Mid-year 2021
Aug 21 (SecurID) Identity Governance: Do you know who has access to what?
Aug 21 (SecurID) Identity Governance and Administration: There’s More to Identity Than Authentication
Aug 21 (SecurID) Zero Trust: Identity and Access Management Paves the Way
Aug 21 (SecurID) Identity and Access Management in the Cloud: Make It Easy on Yourself
28 Jul 21 (SecurID) Identity and the U.S. Government Cybersecurity Executive Order
13 Jul 21 (SecurID) Why Cybersecurity Needs to Make Ransomware more Expensive (for Hackers)
13 Jul 21 (SecurID) Faster, Simpler, Safer: SecurID Accelerates and Improves Cloud Journeys
6 Jul 21 (SecurID) Identity and Access Management in the Cloud
1 Jul 21 (SecurID) For the third consecutive year, SecurID returns to the KuppingerCole Leadership Compass
19 Jun 21 (SecurID) Passwordless Access with SecurID and FIDO 2
14 Jun 21 (Fortinet) Navigating the Threat Landscape As Social Engineering Lures Change
3 Jun 21 (Fortinet) Commemorating 50 Years of Email and How to Keep Your Email Secure
27 May 21 (Micro Focus) Micro Focus Fortify named a Gartner Magic Quadrant Leader 8 times for Application Security Testing
25 May 21 (Tanium) Q&A with Sanjay Joshi: Transforming Healthcare
20 May 21 (Fortinet) Embracing Work from Anywhere with SD-WAN
18 May 21 (SecurID) Why you should go passwordless with SecurID
17 May 21 (Fortinet) Analyzing the History of Ransomware Across Industries
10 May 21 (Tanium) How to Build IT Resilience in 2021: Topics and Tactics
10 May 21 (Cisco) The 2021 Gartner Magic Quadrant for Endpoint Protection Platforms
3 May 21 (Cyfirma) How To Defend Against Hackers: Three Cyber Intelligence Viewpoints
2 May 21 (Fortinet) Protecting Against Evolving Ransomware Attack Trends
26 Apr 21 (Fortinet) Addressing the Cybersecurity Skills Gap by Diversifying the Cybersecurity Workforce
23 Apr 21 (Tanium) Do Agencies Need Next Generation Software, Or Are They Just Chasing Diminishing Returns?
20 Apr 21 (Tanium) Why Real-Time Data Is Essential for IT Help Desk Effectiveness
15 Apr 21 (Cisco) Duo Security Named a 2021 Gartner Peer Insights Customers’ Choice for Access Management
2 Apr 21 (Acronis) 5 steps to take for better cyber protection in 2021
Apr 21 (Cisco) 2021 Security Outcomes Study for SMBs
31 Mar 21 (Acronis) Convenience and security: Exploring the advantages of subscription software
24 Mar 21 (Acronis) WEF report findings - Cybersecurity guide for boards of directors
23 Mar 21 (Acronis) Charting a low-risk path to modern disaster recovery
19 Mar 21 (Acronis) The philosophy of cyber protection - by Candid Wuest, VP of Cyber Protection Research at Acronis
11 Mar 21 (Acronis) SMBs face cybersecurity challenges post-pandemic
28 Jan 21 (Acronis) Modern Data Privacy challenges
Jan 21 (Cisco) Defending Against Critical Threats
Jan 21 (TrendMicro) 2021 Security Predictions