Story image

Whitepaper: What is cybercrime doing closer to home?

18 Jan 18

‘Inevitable’ is a common word assigned to cybercrime in today’s times.

Cyber attackers are employing some of the most sophisticated attack techniques that are harder to detect and mitigate, emboldened by the fact that they cannot be prosecuted easily especially when the breach is conducted remotely.

And this is concerning, as many organisations are now becoming risk averse to adopting digital transformation to safeguard against these attacks, making them less competitive and more vulnerable to threats.

But what’s the cybersecurity landscape like closer to home? To answer that question, LogRhythm has released a whitepaper from Frost & Sullivan that delves into cybersecurity maturity in Asia Pacific (APAC).

The comprehensive study garners insights on what specific APAC countries are the most cyber mature, as well as introducing the Frost & Sullivan Cyber Resilience Framework to help enterprises put into place the requirements for attaining the status of a resilient business.

WatchGuard’s eight (terrifying) 2019 security predictions
The next evolution of ransomware, escalating nation-state attacks, biometric hacking, Wi-Fi protocol security, and Die Hard fiction becomes reality.
Why the adoption of SAP is growing among SMEs
Small and medium scale enterprises are emerging as lucrative end users for SAP.
Exclusive: How the separation of Amazon and AWS could affect the cloud market
"Amazon Web Services is one of the rare companies that can be a market leader but remain ruthlessly innovative and agile."
HPE extends cloud-based AI tool InfoSight to servers
HPE asserts it is a big deal as the system can drive down operating costs, plug disruptive performance gaps, and free up time to allow IT staff to innovate.
Digital Realty opens new AU data centre – and announces another one
On the day that Digital Realty cut the ribbon for its new Sydney data centre, it revealed that it will soon begin developing another one.
A roadmap to AI project success
Five keys preparation tasks, and eight implementation elements to keep in mind when developing and implementing an AI service.
The future of privacy: What comes after VPNs?
"75% of VPN users said they are seeking a better solution for cloud networks."
'Public cloud is not a panacea' - 91% of IT leaders want hybrid
Nutanix research suggests cloud interoperability and app mobility outrank cost and security for primary hybrid cloud benefits.