E-Books and White PapersCloud SecurityCyber SafetyThreat Detection & Defense

November 2024 Special Focus: Is There Such a Thing as Too Much Security?

In today’s cybersecurity landscape, organisations face the daunting task of defending an ever-expanding digital frontier. From endpoints and networks to APIs and identity protection, the challenges are immense and the solutions seem to be multiplying at a pace that overwhelms even the most seasoned IT teams.

This November issue of Special Focus looks at the complexity of modern cybersecurity tools and explores a critical dilemma: as threats become more sophisticated, can we really strengthen our defences, or is “tool bloat” making our jobs harder?

In this issue, we gather experts working at the forefront of digital transformation and cybersecurity to discuss, from different perspectives, whether adding more tools to our arsenal is the right approach — or if we need to scale back.

With contributions from:

  • Ian Farquhar, Security Chief Technology Officer, Gigamon
  • Annette Lee, Head of Global Enterprise, Asia Pacific, Verizon Business Group
  • Jonathan Jackson, Senior Director, Strategic Technical Sales APAC, BlackBerry
  • Kylie Watson, Head Of Security F or Asia Pacific, Middle East And Africa, DXC Technology
  • Jake Moore, Global Cybersecurity Advisor, ESET
  • Nick Harders, APJ S ASE Director, HPE Aruba Networking
  • Philip Sow, Head of Systems Engineering, Southeast Asia and South Korea, Proofpoint

If you’re navigating the ever-changing world of cybersecurity and looking for answers on how to balance innovation with effective protection, this issue is a must-read.

Download now and learn more about the practical strategies that can help you stay ahead of the curve.

Cybersecurity Tool Bloat

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *