Asia's leading source of security and threat news
These search results are from across the Techday Network of sites
Access management employees will thank you for – Seos has you covered
Seos can be ported onto microprocessor devices, allowing the credential system to be delivered on mobile devices, wearables, and smart cards.
Singapore firm embraces blockchain to fight credential fraud
A Singapore tech firm is using blockchain technology to bring validation and authentication to CVs and other credential types.
Credential theft is the hottest trend for cyber attackers in Q2
This year cyber attackers have narrowed their focus to methods that involve credential theft, be it through malware, phishing or brute force attacks.
Javelin Networks: Give up on honeypots, because attackers will outsmart them
Honey tokens, which are honeypots that are not computers, are easily studied and avoided by the average attacker.
Poor password choices make it easy for credential stuffing attacks, Digital Shadows warns
“Enterprises - and the companies that work for and with them - need to be better prepared for this sort of brute force attack."
Digital university credentials enhance student mobility
"My eQuals will enhance student mobility & streamline processes for employers and others who will be able to verify the authenticity of credentials."
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.
Whitepaper: How to make sure your security architecture keeps up with surging network speeds
The annual cost of cybercrime is expected to exceed US$6t by 2021 with a large contributor being the sheer amount of data that requires processing.
Whitepaper: The key to compliance is governing access to data
By implementing a governance-based approach to identity governance, companies can secure their organisation’s sensitive data.