Asia's Source for Enterprise Network Knowledge

Sunday, February 26th, 2017

Identity and Access Management

HID Global, forecasts a shift in the use of identity technology that will lead to increased...
Empowering the patient There is serious personal risk associated with a healthcare data breach,...
First iOS trojan exploiting Apple DRM design flaws infects any iOS device
Identity management vendor Okta and Google have announced a partnership aimed at getting...
News
The traditional meaning of people “getting taken for a ride” is that they are victims...
Financial institutions and online service providers are engaging customers via a widening array of...
Two prevailing industry trends are driving a new perspective regarding applications –...
The quest for business agility, availability, collaboration and cost savings, among other...
News
Earlier this month, Check Point Software released its 2015 security report which found that mobile...
Security researchers’ recent discoveries of a vulnerability in the internet-connected...
Ixia takes a look at some of the urgent new security threats facing companies and what companies...

WhitePapers

Security tools can’t inspect what they can’t see. To defend against...
We have reached that point. The one where there is so much data on the network...
Advanced threats such as zero-day exploits and custom malware are on the rise....