A new study titled "Vulnerability Management Trends in Asia Pacific" conducted by Forrester Consulting shows Australia’s information security practitioners cite managing risk as a top priority for their companies, yet demonstrate that their vulnerability management is inadequate.
The typical CISO deploys an average of 80 security tools in layers throughout their IT environment — including firewall, intrusion detection, SIEM, antivirus, threat intelligence, vulnerability management, forensics investigation, and many other technologies.
First it was shadow IT software, and now it Is shadow IT assets – both can have the same devastating effect on the best-laid enterprise security plans.
If you do not know what Nessus is and you are a chief information or chief security officer – read on.
Network monitoring vendor Tenable Network Security has appointed Sean Molloy as vice president of cloud services
Network monitoring vendor Tenable Network Security has appointed Gary Jackson to the role of vice president of sales in the Asia Pacific region.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]