Asia's Source for Enterprise Network Knowledge

Tuesday, March 26th, 2019

Security

Top 10 public cloud security recommendations

Just as the nascent adoption of the public cloud introduces new business, productivity and agility opportunities, so too does it expose potential security risks. This paper is intended to arm security teams with the information they need to engage early, ask appropriate questions and work toward protecting the public cloud as vigilantly as the data center.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Cryptocurrency gold rush on the dark web

Carbon Black has found that modern-day cybercriminals are increasingly using the dark web to facilitate cryptocurrency theft on a large scale. Read on to find out more.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Secure connectivity for networked industrial machines and the internet of things

Concerns have been raised that the internet of things is being developed too rapidly, without appropriate consideration of the profound security challenges involved. Whereas traditional cyber criminals target information and financial assets, hackers exploiting vulnerabilities in the internet of things. Security should not be an afterthought in the expansion of IoT.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Building a data security strategy – why the industry needs to work together

By 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half will be secured says expert. 

Slack rolls out enterprise key management, but has no plans for end-to-end encryption

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The team collaboration software maker hopes to give enterprise customers more control over sensitive data such as messages, files and comments with the key management feature.

 

Facebook passwords for hundreds of millions of users were exposed to Facebook employees

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Facebook says there's no evidence that any of the passwords were leaked outside the company.

 

Cisco directs high priority patches for IP phone security exposures

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Cisco warns on SIP vulnerabilities in 8800 and 7800 series IP business phones

 

Quantum computing will break your encryption in a few years

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Standards bodies are expected to approve quantum-safe encryption algorithms at around the same time experts are predicting that quantum-powered decryption threatens modern security, so a hybrid approach is possible.

Juniper Networks unveils ‘connected’ security architecture

Commvault Software now enables Hadoop, Greenplum & GPFS big data environments

Partners with vendors such as Nutanix and Aruba to roll out new framework

 

Evolving DDoS landscape a major threat to CSPs

The exponential growth of botnets fueled by the proliferation of Internet of Things (IoT) devices and the immense power they command is driving up the sophistication, scale and speed of today’s Distributed Denial of Service (DDoS) attacks. Compounding the DDoS challenge for Communications Service Providers (CSPs) are cataclysmic IoT-based attacks to constantly and automatically change parameters and signatures in response to cyber-defense.