Asia's Source for Enterprise Network Knowledge

Monday, May 1st, 2017

Security

Built-in security for Web Applications

Application security

Applications are front-facing and therefore exposed to hackers who are constantly trying to compromise the confidentiality, integrity and availability of the data.

10 ways CSOs can achieve ROI on a network solution

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Companies can’t be solely focused on protecting the organization against security breaches

 

Cloudflare wants to secure IoT connections to the internet

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The Cloudflare Orbit service allows IoT manufacturers to protect devices against attacks even when firmware patches are not yet ready

 

Failure to communicate helps ransomware prosper

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

A panel at SOURCE Boston 2017 agreed that fighting ransomware will take more communication

 

Digital disruption: What does it mean for human-machine synergy

Could this be a budding harbinger of the next wave of Internet of Things (IoT)-driven digital disruption?

Minding the do-more-with-less trap

As technologies advance and herald new levels of optimization and efficiencies, many organizations have rightfully and earnestly sought more productive yet cost-effective ways of delivering IT driven by the mantra "do more with less". But despite the fervor, the verity of doing more with less can be so easily misconstrued or distorted if it is not applied without proper consideration for new factors of success in the digital era.

INFOGRAPHIC | Preparing for the Top Cyber Attacks of 2017

This infographic breaks down the preparedness of 403 IT security professionals, looking at the key attack types expected to cause the biggest problems in 2017, and evaluating the frameworks they use to defend themselves.

Reinventing Vulnerability Management and Compliance Reporting

Skybox were contracted by the world's largest, exclusively online bank to help ensure transactions were fully secure. The customer was concerned about the strength of its network security and vulnerability management processes. In addition, the bank lacked automated compliance reporting. As an online financial services provider, the organization was subject to strict compliance requirements and regular audits. Without automation, the IT security team couldn’t possibly keep up with security and compliance needs.

Balancing Digitization and National Security ‐ “Growth pains” galore

We look at some of the growth pains of Indonesia, the role of the Internet in society, and the potential of the data centre business under the GR82 regulation.

At $175, this ransomware service is a boon to cybercriminals

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

A Russian-speaking user has been advertising the ransomware-as-a-service, according to Recorded Future