Asia's leading source of security and threat news
The good and bad of Office 365 security
Let’s start with the positives. Office 365 adoption, and going cloud in general, is good for security.
CrowdStrike and Secureworks partner to integrate UEBA and endpoint protection platform
When the joint offering becomes generally available, both Secureworks and CrowdStrike customers will have access from additional countermeasures driven by the integration.
How voice biometric solutions reduce friction and cut fraud
"By deploying voice biometric solutions, organisations are able to authenticate customer transactions instantly."
Security Technology Alliance
Internet of Things
Acronis Disaster Recovery Cloud
Review: Cut through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
New online tool helps organisations evaluate security maturity
The report also assigns a current security maturity tier and compares the organisation’s results to peer benchmarks.
Research finds majority of businesses failing to comply with GDPR
70% of companies couldn’t fulfil data access and portability requests within the GDPR-specified one-month time limit.
BlackBerry to roll out EoT platform by end of 2018
BlackBerry has unveiled a new Enterprise of Things (EoT) platform that enables OEMs to produce ‘things’ with high levels of security and safety.
Interview: CA Technologies explores the state of digital trust in APJ
A recent survey by CA Technologies found that 40% of APJ executives have sold customer data, although many cybersecurity pros aren’t actually aware that this happened. How is this possible?
WatchGuard launches multi-factor authentication solution aimed at SMBs
WatchGuard’s AuthPoint solution is a cloud service that can be deployed and managed from any location without the need for expensive hardware components.
Fortinet adds network access control solution for IoT
FortiNAC provides visibility and control of IoT services and automated response to threats at scale in multi-vendor environments.
Yubico to provide hardware security key with Okta’s MFA
YubiKeys, hardware-based protection in the form of physical devices, provide an option for a second factor in Okta MFA.
Our new look: A user experience revolution and a stronger content focus
We’re excited about how this new look reflects what we believe in delivering.
Bitdefender invests in APAC with acquisition of SMS eTech business line
From its base in Melbourne, the new Bitdefender Australia office will retain all current employees of SMS eTech working on the Bitdefender business line.
New research reveals which employees are being targeted for why
Individual contributors and lower level management account for nearly two thirds (60%) of highly targeted attacks within an organisation.
Azure platform exploited the most for DDoS attacks – report
Research found a 35% increase DDoS attacks using public cloud server-based botnets from the previous 12 months.
More than 40% of ICS computers were attacked in H1 2018
Cyber attacks on industrial computers are considered to be an extremely dangerous threat as they cause material losses and production downtime for a whole system.
Managing OT cybersecurity vulnerabilities at industrial facilities – PAS Global
Focusing on Level 2 endpoints gives only a surface view because they make up only 20 percent of endpoints that exist in process control networks.
Survey: Rising role of IT in physical security provides opportunities
In addition to taking care of cybersecurity, IT departments are having to adapt to spearhead issues set forth by the physical security dept.
Exclusive: How companies can stay secure in the cloud
"Organisations moving to the cloud must defend against malware that can infect a business by spreading through personal and corporate devices."
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.
Interview: Aruba's new security offering, changing partner ecosystem
Hewlett Packard-owned network infrastructure provider Aruba has announced a stronger focus on user experience and cloud enablement.
Downtime a crippling issue in APAC State of Wi-Fi Study
Ruckus has released findings from its study of 1200 organizations in APAC who collectively have lost US$53m from downtime in the last 12 months.
Cloud security a winning strategy to protect valuable data
Software-defined networking may be key to tackling security concerns about ever-increasing amounts of data in the enterprise space, says GlobalData.
MEGA's Chrome extension hacked; third party credentials exposed
The malicious Chrome extension asks for elevated permissions & steals credentials from sites such as Amazon, GitHub, Live.com, My Monero, plus others.
Proofpoint launches email analysis and phishing remediation solution
Proofpoint CLEAR is the first joint solution announcement following its acquisition of Wombat Security.
NTT Security launches web security-as-a-service with Symantec
The service offloads the burden of real-time network and device monitoring, advanced security analysis and security management.
Exclusive: SailPoint CEO on why bot identities need to be scrutinised
Bots today have access to mission-critical systems, applications and data, just like any other user within the organisation.
Secureworks opens up proprietary UEBA through partner programme
With the launch of its Red Cloak Partner Program, Secureworks will engage in a more transparent exchange of raw data with participating vendors.
Botnet activity spreading multi-purpose malware tools
Cybercriminals who use botnets to conduct their attacks are shifting away from single-purpose malware .
Cyber attackers using businesses to target nation states
64% of incident response professionals had experienced attackers launching secondary command and control after an initial attack was shut down.
NordVPN launches dedicated Linux app
Most VPN providers offer Linux connectivity without the app support, and that is not always the easiest way, especially for beginners.