INDVSTRVS
  • ABOUT US
  • TRIBES
    • ALL TRIBES
    • WHO OUR TRIBES ARE
    • HUMAGISTS
    • MERCHANTS
    • PHILANTHROPISTS
    • THINKERS
    • TECHNOLOGISTS
    • INDUSTRIALISTS
    • PENNIPAKISTS
    • ARTISANS
  • CULTURE CHOCK
  • RUBE GOLDBERG
  • COMMUNITY
×
Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Strong-Competition-and-Security-Posture-a-Must-for-SMBs.jpg
RUBE GOLDBERGTECHNOLOGISTS

Strong Competition and Security Posture a Must for SMBs

INDVSTRVSNovember 26, 2020

CyberArk Vice President Solution Engineers APJ Jeffrey Kok says cybercriminals target companies of all sizes, and smaller organisations should make investing in a strong security posture a priority.

Deconstructing-Human-Nature-and-Social-Engineering-Attacks.jpg
CULTURE CHOCKTECHNOLOGISTS

Deconstructing Human Nature and Social Engineering

INDVSTRVSOctober 22, 2020

CyberArk Security Research Team Leader Nir Chako unpacks how the Twitter attack deployed social engineering, and, what it reveals about human nature...

Machine-Learning-is-Not-the-Answer-to-Mobile-Ad-Fraud.jpg
RUBE GOLDBERGTECHNOLOGISTS

Machine Learning is Not the Answer to Mobile Ad Fraud

INDVSTRVSSeptember 22, 2020

Adjust Team Lead Fraud Specialist Pola Vayner says while Machine Learning can spot patterns of data that are too complex for humans to notice, as its a relatively new technology, it is not yet able to discern which traffic to reject.

How-to-Build-a-Phishing-Resistant-Authentication-Platform.jpg
RUBE GOLDBERGTECHNOLOGISTS

How to Build a Phishing Resistant Authentication Platform

INDVSTRVSSeptember 15, 2020

FIDO Alliance Executive Director and Chief Marketing Officer Andrew Shikiar discusses how organisations can build a phishing-resistant authentication platform and argues that the elimination of passwords is the first step...

How-to-Get-Executive-Buy-In-to-Adopt-a-Security-First-Posture.jpg
TECHNOLOGISTSTRIBE

Get Executive Buy-In to Adopt a Security-First Posture

INDVSTRVSSeptember 8, 2020

Rubrik Vice President and GM APJ Kamal Brar says by tying the security strategy back to the business impact, IT leaders can help stakeholders understand the importance of investing time and resources into a security-first posture.

Global-Manufacturing-Supply-Chains-Threatened-by-DNS-Attacks.jpg
INDUSTRIALISTSTRIBE

Global Manufacturing Supply Chains Threatened by DNS Attacks

INDVSTRVSSeptember 7, 2020

EfficientIP Vice President Nick Itta discusses why downtime caused by phishing and malware jeopardizes the global manufacturing industry.

Held-Hostage-With-Just-a-Click-of-a-Mouse.jpg
TECHNOLOGISTSTRIBE

Ransomware Holds Hostage With Just a Click of a Mouse

INDVSTRVSAugust 25, 2020

Veritas Technologies Country Director Singapore Justin Loh says by proactively following industry best practices and recovery solutions, you can strengthen your organization’s operational resiliency, and grit, against ransomware sieges.

A-Clean-Identity-Infrastructure-Prevents-Credential-Stuffing-Attacks.jpg
TECHNOLOGISTSTRIBE

A Clean Identity Infrastructure Prevents Credential Stuffing Attacks

INDVSTRVSAugust 12, 2020

Auth0 Regional Director APAC Richard Marr discusses why identity infrastructure needs to be a priority; as organisations becomes larger and more dispersed, there is a need for a secure identity infrastructure that allows for scalability in a more sustainable way.

Cardinal-Sins-of-Cyber-Security-Mismanagement-Misconfiguration-Mistakes.jpg
TECHNOLOGISTSTRIBE

Cardinal Sins of Cyber Security; Mismanagement, Misconfiguration, Mistakes

INDVSTRVSAugust 5, 2020

CenturyLink APAC Director Product Management Security and former Member of Cloud Security Alliance Singapore Cheah Wai Kit sheds light on common misconceptions around security and why it is important for business leaders to instill cyber security awareness and responsibility among employees.

Know-your-Software-Security-Requirements-for-your-Requirements.jpg
TECHNOLOGISTSTRIBE

Know your Software Security Requirements for your Requirements

INDVSTRVSAugust 4, 2020

Synopsys Software Integrity Group Security Consultant Jamie Boote shares how to build your own robust and specific software security requirements to help you lock down what your software does so it performs strictly as intended.

Older Posts

© 2020 INDVSTRVS. All rights reserved