Asia's leading source of security and threat news
These search results are from across the Techday Network of sites
Flaw discovered in Intel chips, allows attackers to steal cloud data
Foreshadow is the third major flaw found in Intel chips this year after Spectre and Meltdown.
Time capsule app TimeHop breached, 21 million users affected
The breach occurred as an access credential to TimeHop’s cloud computing environment that didn't have multifactor authentication was compromised.
Hackers exploit Tesla's AWS servers to mine cryptocurrency
Tesla is reassuring customers that a recent cryptojacking has not compromised vehicle safety of customer privacy.
Accenture's data breach stark reminder of server misconfiguration dangers
Publicly downloadable information included credentials, platform configurations, certificates, decryption keys and API data.
Redlock signals company growth with new appointments
RedLock's CEO says, "The talent that Ankur and Viswa bring to the table will further our ability to serve customers with cutting-edge solutions"
Cloud security startup RedLock debuts channel program
Cloud infrastructure security company RedLock has launched its first partner program as the startup seeks to drive all its sales via the channel.
Google Groups users unwittingly leaking information: Change sharing settings now
Google has been the focus of two major security warnings this week, one of which exposes a major hole in Google Groups.
Startup RedLock emerges from stealth with public cloud security offerings
Channel focused security startup RedLock has emerged from stealth with a platform which automates protection across multiple public cloud vendors.
Whitepaper: How to explain why IT security needs more budget
Do you want to convince your higher-ups that IT and security need more budget?
Review: Cut through the noise with AI-driven threat analytics
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
Identity governance: The all-in-one solution for GDPR compliance
The GDPR affects any company that deals with individuals living in the EU and has very specific requirements for the treatment of their personal
The crucial guide to deploying a SIEM solution successfully
SIEM solutions have far-reaching benefits, but Gartner says there are a lot of factors to consider to avoid disaster - here's the company's guide.