Category: Commentary

White-hat hackers to the rescue 0

White-hat hackers to the rescue

By: Nilesh Jain, Vice President of South East Asia and India, Trend Micro Research and development are two globally accepted business functions across sectors, and cybersecurity is no stranger to this. The recent SingHealth...

Security and the Internet of Things (IoT) 0

Security and the Internet of Things (IoT)

By: Jeffrey Kok, Vice President of Solution Engineer, Asia Pacific and Japan, CyberArk Today, it seems everything is automated. We can set the coffee pot to begin brewing at 6:30 AM sharp, turn the...

Browser is the endpoint 0

Browser is the new endpoint

By: Rajesh Ranganathan, Product Manager, ManageEngine When asked to name their critical network endpoints, most IT pros would cite mobile devices, laptops, desktops, and servers. A few might include wearables and other emerging end-user hardware....