SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.

Stories by Sara - Page 77

Anonymous studio figure photography facial mask 38275

'What's a DDoS?' Why APAC IT teams think employees are reckless

Wed, 24th Jan 2018
#
ddos
#
application security
#
a10 networks
IT teams may see employee behaviour as reckless or negligent, but 90% believe that it's because of a lack of education.
Thinkstockphotos 626585596

NTT-AT & Trusona partner to deliver NoPasswords solution in Japan

Wed, 24th Jan 2018
#
mfa
#
iam
#
cybersecurity
NTT Advanced Technology is now partnering with identity authentication provider Trusona to bring multi-factor authentication to customers in Japan.
Thinkstockphotos 899670516

Out with credit cards & in with identity data: Cybercriminals take fraud to new levels

Wed, 24th Jan 2018
#
physical security
#
identity theft
#
online fraud
Cybercriminals are ditching the 'quick buck' methods of stealing credit cards and are instead going after identity data.
Thinkstockphotos 637574902 mfwitwm

Japan is APAC's first nation to join the NATO Cooperative Cyber Defence Centre of Excellence

Tue, 23rd Jan 2018
#
cybersecurity
#
r&d
#
nato
Japan is now a member of of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), a NATO-accredited cyber defence hub located in Estonia.
Thinkstockphotos 654385736

APAC firms leaving password management to employees - at a cost

Tue, 23rd Jan 2018
#
ovum
#
passwords
#
lastpass
Asia Pacific organisations admit that employee behaviour and IT policy don't match up, particularly when it comes to passwords.
Thinkstockphotos 670953786

Have I Been Pwned creator Troy Hunt to give lesson on security-centric cultures

Tue, 23rd Jan 2018
#
risk & compliance
#
cybersecurity
#
microsoft
'Creating a Security-Centric Culture' is designed to help CISOs and their teams with insight into the tools and methods needed to fight breaches.
Thinkstockphotos 696209402

“Last year was a phenomenal one for SailPoint on many fronts' - CEO

Tue, 23rd Jan 2018
#
iam
#
cybersecurity
#
identity governance
SailPoint has credited its staff and passion for innovation for what the company describes as an 'award-winning' year in 2017.
Thinkstockphotos 898250834

APAC to be the fastest-growing region for security assessment services

Mon, 22nd Jan 2018
#
devops
#
apm
#
software development
Asia Pacific will be a hotspot for security assessment vendors as it becomes the fastest growing region in the world between 2017-2022.
Thinkstockphotos 489436830

Fujitsu rolls out biometric palm vein authentication in Japan offices

Mon, 22nd Jan 2018
#
biometrics
#
iam
#
cybersecurity
Fujitsu is rolling out its biometric palm vein authentication solutions within its own company to replace passwords used by around 80,000 employees.
Thinkstockphotos 476580161

Zyklon HTTP malware creates gaping backdoors through MS Office exploits

Mon, 22nd Jan 2018
#
malware
#
ddos
#
breach prevention
Zyklon HTTP malware is described as a publicly-available and fully featured backdoor that is able to conduct DDoS attacks, steal passwords...
Thinkstockphotos 516134724

Germany outpaces APAC region for cloud security savviness

Mon, 22nd Jan 2018
#
encryption
#
cloud security
#
accenture
Germany's lead in cloud security outpaces efforts in the Asia Pacific region in areas including data sharing, encryption and cloud deployment.
Image gallery

HKPC to Hong Kong businesses: Be prepared for financially-motivated cyber attacks in 2018

Fri, 19th Jan 2018
#
malware
#
ransomware
#
phishing
According to the Hong Kong Computer Emergency Response Team, there were 6506 security incidents reported last year - a 7% increase since 2017.
Thinkstockphotos 904817678

LogRhythm launches GDPR compliance module as deadline draws near

Fri, 19th Jan 2018
#
siem
#
hyperscale
#
public cloud
LogRhythm has taken the plunge into the pre-GDPR market as businesses worldwide prepare their compliance strategies.
Thinkstockphotos 494219400

Frost & Sullivan: IoT security & surveillance sensor market set to flourish

Fri, 19th Jan 2018
#
surveillance
#
iot
#
healthtech
In 2016 the total sensors market in security and surveillance applications reached more than $6.2 million – a number that's set to double by 2023.
Thinkstockphotos 905438336

Blockpass joins Trusted IOT Alliance & Digital Identity Foundation

Thu, 18th Jan 2018
#
blockchain
#
iot
#
iam
Blockpass aligns with the Decentralized Identity Foundation and the Trusted IOT Alliance, paving the way for the launch of its self-sovereign identity solution.
Thinkstockphotos 905319314

NEC contributes biometric & sensor tech to Singapore public safety trials

Thu, 18th Jan 2018
#
digital signage
#
surveillance
#
biometrics
The security trials, conducted over a 12-month period, were held both in and near Jurong Island as part of the Safety and Security Industry Programme.
Pexels photo 261706

WatchGuard buys Percipient Networks to harness DNS phishing & malware prevention

Thu, 18th Jan 2018
#
malware
#
firewalls
#
network infrastructure
WatchGuard Technologies has bought out security DNS service provider Percipient Networks, adding phishing and malware prevention to its portfolio.
Thinkstockphotos 847571696

Proficio to deepen APAC presence after 'record-breaking' 2017

Wed, 17th Jan 2018
#
mssp
#
proficio
#
incident management
Proficio plans to expand its global presence across Asia Pacific, Europe and Latin America after a record-breaking 2017.
Csc uk article 5

Singapore Cybersecurity Challenge winners laud UK 'Masterclass' experience

Wed, 17th Jan 2018
#
breach prevention
#
cybersecurity
#
data breach
The Cyber Security Agency of Singapore (CSA) has congratulated participants in last year's Cyber Security Challenge UK Masterclass Finals.
Thinkstockphotos 649345726

Corporate users warned Intel AMT flaw has 'destructive' potential

Wed, 17th Jan 2018
#
intel
#
f-secure
#
security vulnerabilities
Anyone who gains physical access to a machine could create a backdoor in less than 30 seconds and use the backdoor to remotely monitor activities.