Asia's leading source of security and threat news
It’s an active buyer’s market for DDoS-as-a-Service - NETSCOUT
DDoS attacks are cheaper than ever for attackers, lucrative for the attack service provider and financially and operationally crippling for the victim.
Gartner names Sophos leader in Unified Threat Management
“We develop our cybersecurity products to work together as a system, enabling our defences to be as coordinated as cyber attacks.”
Cybersecurity for dummies: How to minimise the risk of data loss
"The value of the data you cannot touch is more than the price of the device you can hold."
Security Technology Alliance
Internet of Things
Acronis Disaster Recovery Cloud
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
Review: Cut through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Hitachi Vantara delivers digital evidence management solution for law enforcement
Law enforcement officials are challenged by compliance policies and procedures such as evidence disclosure rules.
Brewery breach: Not even beer is safe from ransomware
There were no pints enjoyed at this Scottish brewery this week as it fell victim to a crippling ransomware attack.
Avoidable mistakes lead to iOS cryptomining attacks
The attack dubbed ‘Roaming Mantis’ remains highly active, exploring new tricks and techniques to extend its reach.
Living in today’s new cyber regulatory reality
in recent years, the cyber regulatory market has evolved into a well-defined, addressable market with metrics showing its impact in relation to other associated sectors
Why the Lazarus group poses a massive threat to businesses
Heightened cyberheist activity by the notorious Lazarus group could give rise to more fake supply chain attacks.
Cybersecurity risks that can result from Balkanisation in cyberspace
"We can clearly see that the utopia of a borderless digital global village is coming to an end."
Remote administration tools bring unexpected threats to industrial networks
According to a report published by Kaspersky Lab ICS CERT, RATs are incredibly widespread across all industries.
Exclusive: Aruba APAC CTO talks next steps for the region
“So suddenly, in our region, we have become almost early adopters of these new shifts in technological revolutions.”
The good and bad of Office 365 security
Let’s start with the positives. Office 365 adoption, and going cloud in general, is good for security.
CrowdStrike and Secureworks partner to integrate UEBA and endpoint protection platform
When the joint offering becomes generally available, both Secureworks and CrowdStrike customers will have access from additional countermeasures driven by the integration.
How voice biometric solutions reduce friction and cut fraud
"By deploying voice biometric solutions, organisations are able to authenticate customer transactions instantly."
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.
New online tool helps organisations evaluate security maturity
The report also assigns a current security maturity tier and compares the organisation’s results to peer benchmarks.
Research finds majority of businesses failing to comply with GDPR
70% of companies couldn’t fulfil data access and portability requests within the GDPR-specified one-month time limit.
BlackBerry to roll out EoT platform by end of 2018
BlackBerry has unveiled a new Enterprise of Things (EoT) platform that enables OEMs to produce ‘things’ with high levels of security and safety.
Interview: CA Technologies explores the state of digital trust in APJ
A recent survey by CA Technologies found that 40% of APJ executives have sold customer data, although many cybersecurity pros aren’t actually aware that this happened. How is this possible?
WatchGuard launches multi-factor authentication solution aimed at SMBs
WatchGuard’s AuthPoint solution is a cloud service that can be deployed and managed from any location without the need for expensive hardware components.
Fortinet adds network access control solution for IoT
FortiNAC provides visibility and control of IoT services and automated response to threats at scale in multi-vendor environments.
Yubico to provide hardware security key with Okta’s MFA
YubiKeys, hardware-based protection in the form of physical devices, provide an option for a second factor in Okta MFA.
Our new look: A user experience revolution and a stronger content focus
We’re excited about how this new look reflects what we believe in delivering.
Bitdefender invests in APAC with acquisition of SMS eTech business line
From its base in Melbourne, the new Bitdefender Australia office will retain all current employees of SMS eTech working on the Bitdefender business line.
New research reveals which employees are being targeted for why
Individual contributors and lower level management account for nearly two thirds (60%) of highly targeted attacks within an organisation.
Azure platform exploited the most for DDoS attacks – report
Research found a 35% increase DDoS attacks using public cloud server-based botnets from the previous 12 months.
More than 40% of ICS computers were attacked in H1 2018
Cyber attacks on industrial computers are considered to be an extremely dangerous threat as they cause material losses and production downtime for a whole system.
Managing OT cybersecurity vulnerabilities at industrial facilities – PAS Global
Focusing on Level 2 endpoints gives only a surface view because they make up only 20 percent of endpoints that exist in process control networks.
Survey: Rising role of IT in physical security provides opportunities
In addition to taking care of cybersecurity, IT departments are having to adapt to spearhead issues set forth by the physical security dept.
Exclusive: How companies can stay secure in the cloud
"Organisations moving to the cloud must defend against malware that can infect a business by spreading through personal and corporate devices."
Quick thinking remedies vulnerability in Schneider Electric ICS controller
Radiflow discovered that a serious vulnerability in the devices put the safety and availability of ICS networks in jeopardy.