Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019

Security

Top 10 public cloud security recommendations

Just as the nascent adoption of the public cloud introduces new business, productivity and agility opportunities, so too does it expose potential security risks. This paper is intended to arm security teams with the information they need to engage early, ask appropriate questions and work toward protecting the public cloud as vigilantly as the data center.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Cryptocurrency gold rush on the dark web

Carbon Black has found that modern-day cybercriminals are increasingly using the dark web to facilitate cryptocurrency theft on a large scale. Read on to find out more.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Secure connectivity for networked industrial machines and the internet of things

Concerns have been raised that the internet of things is being developed too rapidly, without appropriate consideration of the profound security challenges involved. Whereas traditional cyber criminals target information and financial assets, hackers exploiting vulnerabilities in the internet of things. Security should not be an afterthought in the expansion of IoT.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Cloud security is changing the security channel partner model

Expert expects to see more niche cloud-based partners spring up and uproot many of the established technology partners who are clinging to the past.

The reimagining of app delivery for an agile, multi-cloud world

Applications have become an asset class that is arguably more important for organizations than human talent. 

The First Line of Defense Is Your Employee, Not AI

We talk to the Head Geek at SolarWinds to find out why despite AI being essential in security, the human factor still needs to be around. 

How to lose money to (credential) stocking stuffers

CA strengthens identity-centric security portfolio

Credential Stuffing is an emerging type of attack that uses automated scripts to try out username/password pairs to gain access to a system and is becoming a popular form of attack against enterprises says expert.

Firms pay CEOs more, shareholders less in wake of data breach, analysis reveals

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The report scrutinises 41 publicly listed US companies.

 

Cisco warns of two security patches that don’t work, issues 17 new ones for IOS flaws

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Cisco is issuing 17 new fixes for security problems with IOS and IOS/XE software that runs most of its routers and switches, while it has no patch yet to replace flawed patches to RV320 and RV 325 routers.

 

Building a data security strategy – why the industry needs to work together

By 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half will be secured says expert.