Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019

Cybersecurity and cybercrime

2018 risk:value report, prevention is better than the cure

This report is a survey of 1,800 global business decision makers, to understand their cybersecurity stance. Regrettably, it shows that many organizations are still stuck in a reactive mindset when it comes to security.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Can “cleanpipe” really deliver clean traffic?

Nexusguard’s research findings reveal that communications service providers (CSPs) are increasingly abused by perpetrators as a tunnel to direct DDoS attacks to their downstream networks. This new breed of attacks are carried out in a stealthy way that they can easily bypass detection. Faced with evolving DDoS attack patterns and tactics that are more difficult to detect and mitigate, service providers are presented with a dilemma. Should they just pass on the attack traffic, knowingly or unknowingly, to the victim customer?

2018 global threat intelligence report

The NTT Security 2018 Global Threat Intelligence Report highlights notable threats, incidents and trends observed during the previous year. This report illustrates shifts in attacker focus across geographic regions and industry sectors, helping provide a deeper understanding of what organizations should consider during business operations, as well as for business continuity and disaster recovery planning.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Turn DDoS challenge Into opportunity for CSPs to succeed in DDoS protection and mitigation market

Communications service providers (CSPs) must turn to a scalable, more effective solution to build the organization’s resilience and capability to protect the core network and deliver truly clean traffic to customers.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Threat report: distributed denial of service

This document discusses the current state of global distributed denial of service (DDoS) attacks as of Q4 2018.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Attackers place cryptojacking apps in the Microsoft App Store

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Microsoft has removed eight applications from its app store for Windows that were mining Monero cryptocurrency without users' knowledge.

 

The Top 3 Privileged Data Breaches in Asia Pacific for 2018

In 2019, BeyondTrust says you should expect privileged attack vectors to continue to rank as the top root cause of breaches for both consumer and business data theft.  

Test-drive your security approach

Selecting the wrong security solution for your organization can result in downtime, data loss or worse, a network breach. Find out how to get it right.

What makes a successful bug bounty program?

Bug bounty programs aren’t a silver bullet, but running a successful program can help you vastly reduce risk. 

The World of Wirearchy: The Future of Security Operation Centres

Social media

As threats evolve and enterprises grow,  the responsibilities within the SOCs will become broader, with focus on managing cyber threats while having active roles in managing business risks.