SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

About Sara

Sara Barker mugshot photo
Sara Barker
Copywriter and Senior News Editor
Sara lives in a world of words and stories. For more than six years she has been delving deep into the rich world of tech news, content creation, journalism and reviews for Techday. She brings an academic background in information systems, marketing, radio, and journalism to her role. She enjoys casual gaming, cats, and reading.
Former TechDay team member.

Stories by Sara - Page 92

Thinkstockphotos 834128226

Interview: Sophos reveals the criminal underbelly of the dark web

Tue, 29th Aug 2017
#
malware
#
firewalls
#
network infrastructure
The dark web may be a place that most of us have heard of as a murky underworld for cybercriminals, but also where most internet users daren't tread.
Thinkstockphotos 497366309

Report: APAC firms must drop risky apps and polish cyber hygiene

Tue, 29th Aug 2017
#
malware
#
firewalls
#
network infrastructure
Asia Pacific has poor cybersecurity hygiene and likes to risk the use of dodgy applications, according to Fortinet's latest threat report.
Thinkstockphotos 804649046

Korean insurance provider detects insider threat through AI

Mon, 28th Aug 2017
#
ai security
#
ai
#
insider threats
Korean insurance provider KB Life has taken on Darktrace machine learning technology to prevent cyber threats.
Thinkstockphotos 517128260

Mobile malware creation is now as easy as downloading an app

Mon, 28th Aug 2017
#
malware
#
ransomware
#
cybersecurity
Mobile malware creation is as easy as downloading an app and potential criminals don't even need to write a single line of code.
Thinkstockphotos 501295321

Japan to drive bulk of $9b NFV market as Olympics approach

Mon, 28th Aug 2017
#
uc
#
network infrastructure
#
sdn
Network function virtualization amongst Asia Pacific telecommunications providers is set to be worth US$9.24 billion in 2022.
Thinkstockphotos 175005807 1

Spammers' work cycles: Mon-Fri with lazy weekends, says IBM X-Force

Mon, 28th Aug 2017
#
malware
#
cybersecurity
#
spam
Attackers using tools such as Dridex and Qakbot spam employees through malicious mail at times when victims are most likely to open all incoming mail.
Thinkstockphotos 499510864

TDR treads middle ground between telco & consumer disputes

Fri, 25th Aug 2017
#
uc
#
tdr
#
broadband
The free and independent TDR service is designed to help consumers manage complaints about any service or provider from their telco.
Thinkstockphotos 837641052

CrowdStrike thrives in APAC as it builds out channel & customer relationships

Fri, 25th Aug 2017
#
endpoint protection
#
ai security
#
edr
Endpoint security provider CrowdStrike has experienced triple-digit growth in Asia Pacific, leading to the rapid expansion of its local offices.
Thinkstockphotos 467786984

Moving to cloud? Focus concerns on operational risk, rather than cybersecurity

Fri, 25th Aug 2017
#
firewalls
#
network infrastructure
#
network security
Businesses should worry less about security and start addressing operational risk when it comes to moving to cloud, according to Palo Alto Networks.
Thinkstockphotos 823247618

Hackers speak: Privileged accounts best way to steal data

Fri, 25th Aug 2017
#
endpoint protection
#
pam
#
edr
From the mouths of the hackers themselves, organisations' privileged accounts are the most attractive targets for gaining access to critical data.
Thinkstockphotos 676364296 gtipnbb

IoT and BYOD still putting firms in the face of danger

Thu, 24th Aug 2017
#
iot
#
byod
#
empired
As best practice security methods continue to evolve around the Internet of Things, so do the attacks on devices linked to corporate networks.
Thinkstockphotos 497640202

It's possible for cyber attackers to change what's in your emails

Thu, 24th Aug 2017
#
email
#
mimecast
#
hacking
A newly-discovered exploit called ROPEMAKER allows an attacker to remotely change the content of any email post-delivery.
Thinkstockphotos 828110664

Two of ISACA's top cybersecurity courses are now available on-demand

Thu, 24th Aug 2017
#
risk & compliance
#
cybersecurity
#
education, learning & training
ISACA launches on-demand cybersecurity courses, enhancing IT pros' skill development and career progression in a flexible format.
Thinkstockphotos 825699826

Meet Joshua, the dark web trawler developed in Australia

Thu, 24th Aug 2017
#
dark web
#
identity
#
matrix international exchange
JOSHUA is able to track state sponsored, activist and insider threats, stolen data markets for privacy goods, credit cards and identity theft.
Thinkstockphotos 622062806

Sydney authentication provider to work with US National Cybersecurity Center of Excellence

Wed, 23rd Aug 2017
#
mfa
#
martech
#
commerce systems
Sydney-based cybersecurity firm TokenOne is now the first Australian company to be selected for a consortium project for the NCCoE.
Thinkstockphotos 452690819

Forcepoint snaps up former Fortinet APAC sales VP to lead local growth

Wed, 23rd Aug 2017
#
firewalls
#
network infrastructure
#
network security
Forcepoint, the cybersecurity firm, has appointed George Chang, former VP of APAC sales at Fortinet, as its new VP of sales for APAC.
Thinkstockphotos 821538018

Inside the Check Point & IBM collaboration: What's in store for the future of cyber defence

Wed, 23rd Aug 2017
#
siem
#
ibm
#
modernisation
IBM and Check Point heighten cyber security defences, merging tech and intelligence to counteract escalating cyber threats.
Thinkstockphotos 511868498

ShadowPad exploit 'one of the biggest' APAC supply chain attacks

Tue, 22nd Aug 2017
#
encryption
#
supply chain
#
kaspersky
Malaysia's MyCERT warns of mass APAC supply chain breach after ShadowPad exploit hits NetSarang servers, stealing data.
Capture

Upside-down flag prompts hack against Malaysian websites

Tue, 22nd Aug 2017
#
ddos
#
hacking
#
cyber attacks
Malaysian websites have been hit by hacks and DDoS attacks reportedly in response to an error in the Kuala Lumpur SEA Games 2017 booklet.
Thinkstockphotos 475253187

Foxit acknowledges zero-days in its PDF software, but no patches yet

Mon, 21st Aug 2017
#
pdf
#
zero day malware
#
foxit
Two zero-day vulnerabilities in Foxit Reader and PhantomPDF can allow attackers to execute malicious code on startup. Safe Reading Mode is recommended.