Asia's Source for Enterprise Network Knowledge

Saturday, March 23rd, 2019

data encryption

Evolving cybersecurity threats and how enterprises can stay ahead

Digitally transforming enterprises are now able to seamlessly integrate a myriad of service providers and business partners globally through diverse private interconnections. Equinix’s Global Interconnection Index volume 2 (GXI2) pointed out that bandwidth to support enterprises’ interconnections to cloud and IT providers in Asia Pacific, for instance, will have grown at a

Why it’s vital for digital-era businesses to think application security first

The attack that exploited a vulnerability resulting from a complex interaction of three distinct software bugs in Facebook’s code late September 2018 affected some 50 million users, of which about 30 million actually had their tokens stolen. 

How proactive bot defense mitigates automated massive DDoS attacks

Early this year, malware compromised thousands of routers made by the Latvian company MikroTik, attacking a vulnerability made public in April 2018 via CIA hacking tools revealed by Wikileaks. More than 7,500 of the routers are reportedly being spied on by attackers forwarding network traffic data to remote servers. 

Preserving the chain of trust in end-to-end encryption

Along with the growth in applications and traffic, everything connected via the internet is posing security risks of data breaches and the theft of critical business and personal data.

Gemalto unveils encryption solutions for cloud and on-premise environments

Gemalto unveils encryption solutions for cloud and on-premise environments

Gemalto has launched two new solutions that encrypt data across the cloud, enterprise applications and high-speed corporate networks.

Dell announces solution that protects data at all stages of the lifecycle

Dell announces solution that protects data at all stages of the lifecycle

Dell Inc. has released Dell Data Protection | Secure Lifecycle, a data protection solution to protect business data at all stages of the lifecycle – at rest, in motion, and in use – whether inside or outside of a network.

Gemalto expands Big Data security offerings

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Gemalto announces a major expansion of its SafeNet data protection portfolio that makes it easier for enterprises to protect big data deployments in the cloud, data center, and virtualized environments.

India's YES Bank secures mobile payment transactions with data encryption

India’s YES Bank secures mobile payment transactions with data encryption

YES BANK, India's fifth largest private sector bank, has deployed Gemalto's SafeNet Network HSM to secure mobile payment transactions for millions of its customers under India's recently implemented Unified Payments Interface (UPI).

Kaspersky Lab, WISeKey launch an encrypted vault for mobile devices

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The WISeID Kaspersky Lab Security cyber-resilience edition locks personal data such as account usernames and passwords, credit card numbers and access PINs into a secure personal data organizer.

Five security must-dos for first time cloud users

Five security must-do's for first time cloud users

First time cloud users can be most at risk, simply because of unfamiliarity with the new environment and the added burden of having to grapple with a new way of managing users, data and security.