SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

About Kai Ping

Kai Ping Lew mugshot photo
Kai Ping Lew
Editor-in-Chief & News Editor - Security
KP was raised in Malaysia and graduated with a degree in Journalism and International Business at AUT. After graduating, she did a stint in broadcast media at TVNZ before deciding to return to her true love, the written word. In her spare time, KP enjoys exploring fictional universes through books, spending time in the sun, playing volleyball, and dancing.
FYI, this is an ex-employee of TechDay.

Stories by Kai Ping - Page 12

Story image
Trend Micro brings analytics to network security solution
Tue, 28th Aug 2018
#
firewalls
#
network infrastructure
#
data analytics
Trend Micro bolsters Deep Discovery with new analytics to tackle the cybersecurity skills gap and escalating threats.
Story image
Exclusive interview: RSA on the road to AI security
Mon, 27th Aug 2018
#
ai
#
ml
#
rsa security
Organisations are now capable of leveraging AI as its advanced to the point of addressing critical issues in cybersecurity.
Story image
APJ customers don’t really trust companies with their data - report
Mon, 27th Aug 2018
#
data protection
#
iam
#
ueba
A report by CA Technologies reveals a significant trust gap in the APJ region, as consumer confidence in data protection by companies scores only 63 out of 100.
Story image
EMA names Pulse Secure leader in hybrid IT secure access platform solutions
Mon, 27th Aug 2018
#
firewalls
#
network security
#
pam
The survey included executives from over 200 enterprises and an analysis of hundreds of vendor product briefings, case studies and demonstrations.
Story image
AI, 5G, and big data: CIOs talk macro trends at Summit
Mon, 27th Aug 2018
#
uc
#
data analytics
#
martech
Events like this provide a unique opportunity to meet up with leading organisations and players in most of the vertical sectors.
Story image
Data protection overlooked in race for digital transformation - IDC
Fri, 24th Aug 2018
#
digital transformation
#
cloud security
#
zerto
Only with resilient operations can businesses mitigate the risk of downtime and focus on projects that drive transformation.
Story image
SailPoint updates IdentityIQ to expand definition of digital identities
Fri, 24th Aug 2018
#
iam
#
bots
#
identity governance
The update gives enterprises the ability to govern non-human identities such as software bots, including robotic process automation (RPA) bots.
Story image
Veritas updates data management solution with simplified user experience
Thu, 23rd Aug 2018
#
virtualisation
#
dr
#
cloud security
Veritas has launched Veritas NetBackup 8.1.2, featuring an improved user interface to simplify data protection and management.
Story image
Exabeam and Okta partner to add context to identity management
Thu, 23rd Aug 2018
#
partner programmes
#
iam
#
okta
The joint Exabeam and Okta solution will help security teams to monitor and protect enterprises against credential-based threats.
Story image
Is BYOD an expensive mistake for your business?
Wed, 22nd Aug 2018
#
personal computing devices
#
byod
#
mobility
Although BYOD can seem like a cost-effective mobility solution, experts warn it might backfire due to security, productivity, and cost concerns.
Story image
Compass Health deploys BlackBerry endpoint management for mobile security
Wed, 22nd Aug 2018
#
smartphones
#
edr
#
healthtech
Compass Health, in operation since 1995, has 60 general practice teams and a number of other healthcare providers in its jurisdiction.
Story image
Exclusive: How AI and quantum computing are changing cybersecurity
Tue, 21st Aug 2018
#
siem
#
iaas
#
quantum computing
AI and quantum computing are transforming cybersecurity, promising enhanced threat detection and faster responses, but also presenting new challenges.
Story image
Hackers using spearphishing to target banks –Bitdefender
Tue, 21st Aug 2018
#
malware
#
cybersecurity
#
bitdefender
To limit the risk of being discovered, attackers operated outside of normal business hours and cashout operations were planned for weekends.
Story image
Privacy management company OneTrust expands into AU and NZ
Tue, 21st Aug 2018
#
data privacy
#
cloud services
#
gdpr
The expansion includes a new office, local data centres and updated product offerings to meet new and amended Australia and New Zealand privacy laws.
Story image
MikroTik routers in NZ may be at risk of cryptomining - Symantec
Mon, 20th Aug 2018
#
symantec
#
router
#
security vulnerabilities
New Zealand's MikroTik routers may be at risk of cryptomining attacks due to a global campaign targeting 157,000 devices, warns Symantec. Install patches.
Story image
Vehicle security startup Trillium recognised by innovation platform
Mon, 20th Aug 2018
#
cartech
#
trillium
#
plug and play
Trillium, a cybersecurity leader in vehicle data protection, has been named Plug and Play's Hottest Company for August, standing out among hundreds of startups.
Story image
Top tips to avoid downloading malicious online banking apps
Mon, 20th Aug 2018
#
malware
#
endpoint protection
#
fintech
Fake apps may require excessive permissions, demand administrator rights, or simply request you enter your banking details and related information.
Story image
How Kiwi SMBs can connect and trade, quickly
Mon, 20th Aug 2018
#
digital transformation
#
apps
#
bartercard
Trade exchange platform Bartercard has recently launched its app, designed to help Bartercard members utilise the network more efficiently.
Story image
Over 2,300 data breaches disclosed so far in 2018 - report
Mon, 20th Aug 2018
#
phishing
#
email security
#
breach prevention
Phishing for and using the stolen credentials to access systems or services stands out as a particularly popular attack method.
Story image
Gigamon partners with Endace for improved network visibility
Mon, 20th Aug 2018
#
firewalls
#
network infrastructure
#
devops
Analysts often struggle to uncover the evidence they need to quickly determine the root cause of cyber threats.