SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Device security stories - Page 6

Screen shot 2025 08 05 at 5

OWC Guardian SSD offers touchscreen security & fast transfers

Tue, 5th Aug 2025
#
data protection
#
encryption
#
mdm
OWC Guardian SSD offers fast USB-C transfer speeds and touchscreen hardware encryption, ensuring secure, convenient data protection for professionals on the move.
Realistic smartphone display face comparison genuine vs deepfake subtle differences

Norton launches AI deepfake detection for mobile in early rollout

Tue, 5th Aug 2025
#
mdm
#
ai
#
cybersecurity
Norton has launched early access to AI-powered deepfake detection on mobile, helping users spot manipulated audio and video on Android and iOS devices.
Secure digital network malaysia shield icons cyber protection enterprises

CelcomDigi launches new AI cyber security suite for enterprises

Tue, 29th Jul 2025
#
firewalls
#
ddos
#
devops
CelcomDigi unveils AI-driven cyber security suite to help Malaysian enterprises tackle rising digital threats with real-time detection and response services.
Image003  3

Suprema leads access control sector with EU CE RED certification

Tue, 29th Jul 2025
#
firewalls
#
data protection
#
network security
Suprema leads the access control sector, securing EU CE RED cybersecurity certification for its AI facial authentication devices ahead of 2025 compliance deadline.
Digital network globe connected lines traditional padlocks few enhanced encryption

Only 6% of SSH servers ready for post-quantum encryption

Sat, 19th Jul 2025
#
firewalls
#
data protection
#
encryption
Only 6% of SSH servers support post-quantum encryption, leaving vital data at risk amid growing quantum computing threats, finds Forescout research.
Sleek workspace apple devices macbooks iphones ai network lines security icons

Jamf unveils AI-powered tools for Apple device security

Mon, 9th Jun 2025
#
mdm
#
supply chain
#
ai
Jamf launches AI-driven tools to boost productivity and security for IT admins, streamlining Apple device management and compliance at scale.
Ps mary attard headshot

A future with no passwords: Why passwordless authentication is key for cyber-resilience

Fri, 2nd May 2025
#
digital transformation
#
mfa
#
mdm
As cyber threats rise and passwords fail, businesses face US$1m annual costs; passwordless authentication offers a secure, efficient future for digital access.
Techday f a7286b1ba17a62142aac

New Android malware exploits NFC to steal funds instantly

Tue, 22nd Apr 2025
#
endpoint protection
#
mdm
#
edr
A new MaaS platform, Supercard X, exploits Android NFC tech allowing cybercriminals to swiftly steal funds, raising urgent security concerns, especially in Asia.
Techday 479a3d7e5c6c88a43056

Beyond Identity launches RealityCheck for Zoom security

Wed, 14th Aug 2024
#
mdm
#
cybersecurity
#
zoom
Beyond Identity's RealityCheck enhances Zoom security, combating AI deception and deepfakes with robust identity and device verification, ensuring safe digital interactions.
Techday 65899a966919bf6f3697

HP study reveals rise in nation-state attacks on supply chains

Thu, 8th Aug 2024
#
malware
#
mdm
#
supply chain
HP Wolf Security's latest study reveals a sharp rise in nation-state attacks on hardware supply chains, with 19% of firms falling victim and future threats expected to increase.
Techday 1dd1a3a7053e3af780c0

Report reveals sharp rise in mobile & IoT security risks

Thu, 8th Aug 2024
#
mdm
#
iot
#
breach prevention
Verizon's 2024 Mobile Security Index highlights a surge in mobile device risks with 85% reporting increased threats; critical infrastructure and IoT devices are most vulnerable.
Img dp9wjbg6kyhiegcf6iohozqp

TCG & OST2 launch TPM security training for software developers

Fri, 15th Mar 2024
#
mdm
#
cybersecurity
#
byod
TCG, in partnership with OST2, marks the 25th anniversary of the first Trusted Platform Module specification by launching a security training course for software developers.
Img xefzpydxowr6lz84qmvpovsl

Beyond Identity unveils Device360 for advanced device security

Wed, 28th Feb 2024
#
mfa
#
mdm
#
iam
Beyond Identity has launched Device360, a unique tool revolutionising continuous device security management and authentication.
Trek madone norway rb high res 190

SOTI Solves Troubleshooting and Security Issues for Trek

Mon, 5th Jun 2023
#
mdm
#
byod
#
mobility
Trek Bicycle Corporation has reported major improvements in operational efficiency after implementing the SOTI ONE Platform.
Gettyimages 874813790

Video: 10 Minute IT Jams - An update from Devicie

Thu, 6th Apr 2023
#
ransomware
#
mdm
#
it automation
Martin McGregor, Co-Founder and CEO of Devicie, shares why the company was created, how it is helping its customers, and what we can expect from it next.
Gettyimages 1394585550

27.5% CAGR for network access control market in 2022-32: FMI

Fri, 17th Mar 2023
#
firewalls
#
network security
#
mdm
The report by Future Market Insights states that the network access control market is expected to reach a valuation of US$27,409.4 million by the end of 2032.
Gettyimages 1169668297

71,000 customers served by Jamf in managing Apple devices

Thu, 26th Jan 2023
#
endpoint protection
#
mdm
#
partner programmes
The company is now helping approximately 71,000 active customers succeed with Apple and is running on about 30 million devices worldwide.
Gettyimages 913588226

Ordr improves security and management of connected devices

Thu, 22nd Sep 2022
#
malware
#
cloud security
#
mdm
It has implemented more than 80 integrations within the Ordr Data Lake while adding security enhancements to accelerate zero trust segmentation.
Gettyimages 1018651722

Forescout reveals top vulnerabilities impacting OT vendors

Wed, 29th Jun 2022
#
iot security
#
mdm
#
byod
Forescout's Vedere Labs has disclosed OT: ICEFALL, naming 56 vulnerabilities affecting devices from 10 operational technology vendors.
Gettyimages 1344683714

How rugged devices can support organisations when the cloud goes out

Tue, 7th Jun 2022
#
dr
#
mdm
#
risk & compliance
Businesses are facing an increased risk from extreme weather events, making rugged devices vital in the case of a disaster.