SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.

Stories by Sara - Page 105

Thinkstockphotos 623982946

Turning digital data into a digital goldmine for business intelligence

Thu, 4th May 2017
#
data analytics
#
martech
#
planning
Businesses unlock their potential by transforming digital data into actionable insights, catalysing growth and innovation.
Thinkstockphotos 87357192

Global warning as spam attacks target stock market manipulation

Thu, 4th May 2017
#
spam
#
stock market
#
retarus
Sophisticated spam blitz threatens markets as Retarus flags a botnet's discreet bid to skew a Latvian stock's value.
Thinkstockphotos 528286738

Don't let Darth Vader destroy your security on World Password Day

Thu, 4th May 2017
#
cybersecurity
#
passwords
#
cyber policy office
If you use starwars100 as any of your passwords, now might be a good time to have a look at how strong your passwords actually are.
Thinkstockphotos 183708591

It's a game of risk: DDoS attacks intensify in 2017

Wed, 3rd May 2017
#
malware
#
ddos
#
cybersecurity
Distributed denial of service (DDoS) attacks are getting larger this year and it's now a game of risk, according to a new report from Neustar.
Thinkstockphotos 502880463

Gemalto puts final touches on 3M Identity Management acquisition

Tue, 2nd May 2017
#
biometrics
#
3m
#
gemalto
Gemalto has put the final touches on its acquisition of 3M's Identity Management Business - a deal worth $850 million.
Thinkstockphotos 517152588

Fight malware by spotting the top eight indicators of threat traffic in your network

Tue, 2nd May 2017
#
malware
#
siem
#
cybersecurity
There are eight main indicators that can help detect compromised networks. Here's how you can catch threat traffic before it cripples your systems.
Thinkstockphotos 637380670

LogRhythm's Network Monitor Freemium an impressive winner when put to the test

Tue, 2nd May 2017
#
storage
#
siem
#
dlp
Not all security tools have to come with a price tag. The SANS Institute takes at a look at LogRhythm's NetMon Freemium Version 3.2.3.
Thinkstockphotos 483815774

Is your healthcare data safe? Here are three ways to protect it

Tue, 2nd May 2017
#
network infrastructure
#
sdn
#
naas
Healthcare providers and healthcare systems have some of the most valuable information not only for patient health, but also for cyber attackers.
Thinkstockphotos 524816639

Are you ready? Only five weeks until China's new data security law comes into effect

Tue, 2nd May 2017
#
data protection
#
supply chain
#
law
With China's new cybersecurity law only five weeks away, businesses should be preparing and understanding the new rules.
Thinkstockphotos 531738031

Atlassian's workplace chat tool 'HipChat' affected by data breach

Tue, 2nd May 2017
#
breach prevention
#
cybersecurity
#
data breach
Workplace group chat tool HipChat has been hit by a data breach and users are being advised to check if they are vulnerable.
Thinkstockphotos 532528931

Criminals on a mission of ambition and disruption, says Symantec

Mon, 1st May 2017
#
malware
#
ransomware
#
email security
Ransomware attackers are increasing their ransoms; more emails are containing malicious links; and disruption is the word of the day.
Thinkstockphotos 669641714 2lohm3t

Dell survey: Australians better than most about sharing confidential information

Mon, 1st May 2017
#
network infrastructure
#
document management
#
ecm
Aussies awareness of data threats outshines global peers, yet Dell finds they're prone to share sensitive info under specific conditions.
Thinkstockphotos 472152276

It's not all about the network: How to protect your outbound data

Mon, 1st May 2017
#
brennan it
#
proxies
#
communication
Outbound data oversight a security Achilles' heel, warns IT expert Dayle Wilson, urging businesses to bolster defences.
Thinkstockphotos 669898794

Digital Realty reports slight revenue drop in Q1 2017

Fri, 28th Apr 2017
#
financing
#
digital realty
Digital Realty's first-quarter yearly revenue dropped 5% to $551 million this year, but the company says it's in good shape.
Thinkstockphotos 513315375

Tencent Cloud opens Silicon Valley data center; Seoul & Mumbai locations to follow

Thu, 27th Apr 2017
#
gaming
#
fintech
#
digital entertainment
Tencent Cloud expands globally, opening Silicon Valley hub with Seoul and Mumbai on horizon to bolster overseas services.
Thinkstockphotos 509238266

Global Switch, China Telecom & Daily Tech sign 'game-changing' data center agreement

Wed, 26th Apr 2017
#
global switch
#
china telecom
#
daily-tech
Asia's data center giants unite in a 'game-changing' pact, poised to revolutionise global digital infrastructure.
Thinkstockphotos 483426432

Australian startup scores analytics contract for Workplace by Facebook

Wed, 26th Apr 2017
#
data analytics
#
martech
#
planning
An Australian startup has scored a deal with Facebook to be the first global platform to offer analytics through Workplace for Facebook.
Thinkstockphotos 671360768

INTERPOL & private sector uncover thousands of threats across ASEAN

Wed, 26th Apr 2017
#
firewalls
#
ddos
#
network infrastructure
INTERPOL has found 8800 Command and Control (C2) servers and hundreds of compromised websites, including government portals across Asia.
Thinkstockphotos 492021523

LogRhythm report casts damning eye on enterprise security tactics

Wed, 26th Apr 2017
#
siem
#
breach prevention
#
cybersecurity
LogRhythm's latest cyber resiliency report casts a damning look into the state of Asia Pacific organisations in Asia Pacific.
Thinkstockphotos 493888509

Big data and machine learning make compelling argument for security

Wed, 26th Apr 2017
#
data analytics
#
martech
#
planning
Big data and machine learning help organisations identify security breaches, according to a report by the Ponemon Institute.