GUEST OPINION by Joanne Wong, Vice President International Marketing – APJ and EMEA at LogRhythm: They’ve been a constant focus for IT security teams for years, however the number of ransomware attacks experienced by organisations around the world continues to climb.
GUEST OPINION by Joanne Wong, Vice President International Marketing – APJ and EMEA at LogRhythm: In the wake of a high-profile spate of cyberattacks that struck organisations around the world during 2022, business leaders are placing very high priority on IT security as they make plans for the new year.
IT Security Leaders Are Held Most Responsible For Cyberattacks, Yet Lack the Influence Required to Shore Up Security Strategies
COMPANY NEWS: LogRhythm, the company powering today’s security operations centres (SOCs), today released its latest report, “Security and the C-Suite: Making Security Priorities Business Priorities.” The research, which focuses on the roles and responsibilities of cybersecurity leaders, found that more than half of organisations (55%) in Asia Pacific (APAC) have experienced a cyberattack in the last two years and spend an average of US$17 million each on security activities.
We asked a number of IT executives what the 'new normal' might look like as the impact of COVID-19 wanes.
Here's what the IT industry executives had to say.
Do Industry executives think our lives will improve? Or will it be Groundhog Year?
With that in mind, what will happen in the telecommunication space?
We posed this question to a broad swathe of senior industry executives. Here's what they had to say.
GUEST OPINION by Joanne Wong, Vice President – International Marketing, LogRhythm: It’s something almost every internet user has experienced. An email arrives, purporting to be from a trusted source, but in reality it’s an attempt to steal personal details or cause disruption.
A high percentage of security professionals lack the tools to detect known security threats and many say they are still in need of the appropriate preventative solutions to close current security gaps, according to a recent global survey.
Businesses that earn the trust of their customers by being responsible stewards of their information will be rewarded with loyalty and positive word-of-mouth recommendations, Mark Perry, the chief technology officer of cloud security firm Ping Identity says.
Women who work in the Australian technology sector are as one in saying that more of their tribe are needed in the ICT industry for a number of reasons. To mark International Women's Day, a number of them offered their opinions as to how the IT industry can attract more female talent in 2019 and in the years ahead.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]